6)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.525759 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.525788 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 37 D0318 17:09:37.526159 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.527464 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.527494 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 38 D0318 17:09:37.527504 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.528573 434971 usertrap_amd64.go:212] [ 2480( 46): 2480( 46)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.528603 434971 usertrap_amd64.go:122] [ 2480( 46): 2480( 46)] Allocate a new trap: 0xc001405770 39 D0318 17:09:37.528614 434971 usertrap_amd64.go:225] [ 2480( 46): 2480( 46)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.528987 434971 usertrap_amd64.go:212] [ 2480( 46): 2480( 46)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.529017 434971 usertrap_amd64.go:122] [ 2480( 46): 2480( 46)] Allocate a new trap: 0xc001405770 40 D0318 17:09:37.529028 434971 usertrap_amd64.go:225] [ 2480( 46): 2480( 46)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.529041 434971 usertrap_amd64.go:212] [ 2480( 46): 2484( 47)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.529048 434971 usertrap_amd64.go:122] [ 2480( 46): 2484( 47)] Allocate a new trap: 0xc001405770 41 D0318 17:09:37.529055 434971 usertrap_amd64.go:225] [ 2480( 46): 2484( 47)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.529996 434971 usertrap_amd64.go:212] [ 2480( 46): 2480( 46)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.530074 434971 usertrap_amd64.go:122] [ 2480( 46): 2480( 46)] Allocate a new trap: 0xc001405770 42 D0318 17:09:37.530105 434971 usertrap_amd64.go:225] [ 2480( 46): 2480( 46)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.530950 434971 task_exit.go:204] [ 2480( 46): 2480( 46)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.530984 434971 task_exit.go:204] [ 2480( 46): 2480( 46)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.531004 434971 task_signals.go:204] [ 2480( 46): 2484( 47)] Signal 9, PID: 2480, TID: 2484, fault addr: 0x0: terminating thread group D0318 17:09:37.531020 434971 task_exit.go:204] [ 2480( 46): 2484( 47)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.531275 434971 task_exit.go:204] [ 2480( 46): 2484( 47)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.531291 434971 task_exit.go:204] [ 2480( 46): 2484( 47)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.531300 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.532000 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce62860:sysno 109 D0318 17:09:37.532037 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 37 D0318 17:09:37.532156 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce62860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 17:09:37.532835 434971 task_exit.go:204] [ 2480( 46): 2480( 46)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.533007 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.533042 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 39 D0318 17:09:37.533053 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.533378 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce36520:sysno 266 D0318 17:09:37.533409 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 38 D0318 17:09:37.533421 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce36520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 17:09:37.535575 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.535620 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 40 D0318 17:09:37.535633 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.535799 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.535851 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 41 D0318 17:09:37.535867 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.535903 434971 usertrap_amd64.go:212] [ 2482( 584): 2485( 585)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.535919 434971 usertrap_amd64.go:122] [ 2482( 584): 2485( 585)] Allocate a new trap: 0xc000b6f380 42 D0318 17:09:37.535931 434971 usertrap_amd64.go:225] [ 2482( 584): 2485( 585)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.536356 434971 usertrap_amd64.go:212] [ 2482( 584): 2482( 584)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.536427 434971 usertrap_amd64.go:122] [ 2482( 584): 2482( 584)] Allocate a new trap: 0xc000b6f380 43 D0318 17:09:37.536485 434971 usertrap_amd64.go:225] [ 2482( 584): 2482( 584)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.537004 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce0bca2:sysno 14 D0318 17:09:37.537030 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 39 D0318 17:09:37.537046 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce0bca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) 17:09:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) read$FUSE(r0, 0x0, 0x0) D0318 17:09:37.537459 434971 task_exit.go:204] [ 2482( 584): 2482( 584)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.537497 434971 task_exit.go:204] [ 2482( 584): 2482( 584)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.537517 434971 task_signals.go:204] [ 2482( 584): 2485( 585)] Signal 9, PID: 2482, TID: 2485, fault addr: 0x0: terminating thread group D0318 17:09:37.537527 434971 task_exit.go:204] [ 2482( 584): 2485( 585)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.537838 434971 task_exit.go:204] [ 2482( 584): 2485( 585)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.537861 434971 task_exit.go:204] [ 2482( 584): 2485( 585)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.537869 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.538491 434971 task_exit.go:204] [ 2482( 584): 2482( 584)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.539424 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce62b92:sysno 435 D0318 17:09:37.539448 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 40 D0318 17:09:37.539455 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce62b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 17:09:37.539592 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce0bc10:sysno 14 D0318 17:09:37.539642 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 41 D0318 17:09:37.539701 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce0bc10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 17:09:37.539853 434971 usertrap_amd64.go:212] [ 2483( 600): 2486( 601)] Found the pattern at ip 5574dce0b320:sysno 273 D0318 17:09:37.539884 434971 usertrap_amd64.go:122] [ 2483( 600): 2486( 601)] Allocate a new trap: 0xc000617c80 42 D0318 17:09:37.539900 434971 usertrap_amd64.go:225] [ 2483( 600): 2486( 601)] Apply the binary patch addr 5574dce0b320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) 17:09:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) D0318 17:09:37.541251 434971 usertrap_amd64.go:212] [ 2483( 600): 2483( 600)] Found the pattern at ip 5574dce35c93:sysno 3 D0318 17:09:37.541283 434971 usertrap_amd64.go:122] [ 2483( 600): 2483( 600)] Allocate a new trap: 0xc000617c80 43 D0318 17:09:37.541293 434971 usertrap_amd64.go:225] [ 2483( 600): 2483( 600)] Apply the binary patch addr 5574dce35c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 17:09:37.541851 434971 task_exit.go:204] [ 2483( 600): 2483( 600)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.541891 434971 task_exit.go:204] [ 2483( 600): 2483( 600)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.541915 434971 task_signals.go:204] [ 2483( 600): 2486( 601)] Signal 9, PID: 2483, TID: 2486, fault addr: 0x0: terminating thread group D0318 17:09:37.541945 434971 task_exit.go:204] [ 2483( 600): 2486( 601)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.542174 434971 task_exit.go:204] [ 2483( 600): 2486( 601)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.542202 434971 task_exit.go:204] [ 2483( 600): 2486( 601)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.542220 434971 task_signals.go:443] [ 59( 1): 59( 1)] Discarding ignored signal 17 D0318 17:09:37.542305 434971 task_exit.go:204] [ 2483( 600): 2483( 600)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.543505 434971 task_signals.go:470] [ 55: 55] Notified of signal 9 D0318 17:09:37.543546 434971 task_signals.go:204] [ 55: 55] Signal 9, PID: 55, TID: 55, fault addr: 0x0: terminating thread group D0318 17:09:37.543558 434971 task_exit.go:204] [ 55: 55] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.543855 434971 task_signals.go:481] [ 59( 1): 59( 1)] No task notified of signal 9 D0318 17:09:37.543871 434971 task_exit.go:204] [ 55: 55] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.543884 434971 task_signals.go:470] [ 7: 7] Notified of signal 17 D0318 17:09:37.543915 434971 task_signals.go:204] [ 59( 1): 59( 1)] Signal 9, PID: 59, TID: 59, fault addr: 0x0: terminating thread group D0318 17:09:37.543949 434971 task_exit.go:204] [ 59( 1): 59( 1)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.544054 434971 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0318 17:09:37.544139 434971 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0318 17:09:37.544432 434971 task_exit.go:361] [ 59( 1): 59( 1)] Init process terminating, killing namespace D0318 17:09:37.544742 434971 task_exit.go:204] [ 59( 1): 59( 1)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.544787 434971 task_signals.go:470] [ 1: 1] Notified of signal 17 D0318 17:09:37.544995 434971 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0318 17:09:37.545009 434971 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0318 17:09:37.545094 434971 task_exit.go:204] [ 55: 55] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.546918 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.546950 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 37 D0318 17:09:37.547032 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.547518 434971 task_signals.go:470] [ 7: 50] Notified of signal 23 D0318 17:09:37.547562 434971 task_signals.go:220] [ 7: 50] Signal 23: delivering to handler D0318 17:09:37.548787 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.548861 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 38 D0318 17:09:37.548925 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.549154 434971 task_stop.go:118] [ 7: 50] Entering internal stop (*kernel.vforkStop)(nil) D0318 17:09:37.551420 434971 syscalls.go:262] [ 2489: 2489] Allocating stack with size of 8388608 bytes D0318 17:09:37.551530 434971 task_stop.go:138] [ 7: 50] Leaving internal stop (*kernel.vforkStop)(nil) D0318 17:09:37.552086 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.552126 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 36 D0318 17:09:37.552242 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.552625 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.552651 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 39 D0318 17:09:37.552667 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.552898 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559ca0064a3:sysno 218 D0318 17:09:37.552939 434971 usertrap_amd64.go:106] [ 2489: 2489] Map a usertrap vma at 66000 D0318 17:09:37.552997 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 1 D0318 17:09:37.553033 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559ca0064a3 trap addr 66050 ([184 218 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0318 17:09:37.553600 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559ca006536:sysno 334 D0318 17:09:37.553632 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 2 D0318 17:09:37.553645 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559ca006536 trap addr 660a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0318 17:09:37.554076 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559ca0167c9:sysno 318 D0318 17:09:37.554102 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 3 D0318 17:09:37.554117 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559ca0167c9 trap addr 660f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 96 6 0]) D0318 17:09:37.554543 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffca00:sysno 12 D0318 17:09:37.554577 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 4 D0318 17:09:37.554588 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffca00 trap addr 66140 ([184 12 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0318 17:09:37.554809 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.554835 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 37 D0318 17:09:37.554845 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.555173 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.555195 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 40 D0318 17:09:37.555206 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.555344 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.555364 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 41 D0318 17:09:37.555372 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.555418 434971 usertrap_amd64.go:212] [ 2487( 586): 2490( 587)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.555461 434971 usertrap_amd64.go:122] [ 2487( 586): 2490( 587)] Allocate a new trap: 0xc0016a5b60 42 D0318 17:09:37.555473 434971 usertrap_amd64.go:225] [ 2487( 586): 2490( 587)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.556454 434971 usertrap_amd64.go:212] [ 2487( 586): 2487( 586)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.556718 434971 usertrap_amd64.go:122] [ 2487( 586): 2487( 586)] Allocate a new trap: 0xc0016a5b60 43 D0318 17:09:37.556751 434971 usertrap_amd64.go:225] [ 2487( 586): 2487( 586)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.557289 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffce60:sysno 10 D0318 17:09:37.557317 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 5 D0318 17:09:37.557332 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffce60 trap addr 66190 ([184 10 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0318 17:09:37.557871 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffe146:sysno 157 D0318 17:09:37.557897 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 6 D0318 17:09:37.557905 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffe146 trap addr 661e0 ([184 157 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0318 17:09:37.558469 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffcddc:sysno 9 D0318 17:09:37.558498 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 7 D0318 17:09:37.558512 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffcddc trap addr 66230 ([184 9 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0318 17:09:37.558574 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffa520:sysno 39 D0318 17:09:37.558593 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 8 D0318 17:09:37.558601 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffa520 trap addr 66280 ([184 39 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0318 17:09:37.559039 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffbc69:sysno 3 D0318 17:09:37.559059 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 9 D0318 17:09:37.559068 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffbc69 trap addr 662d0 ([184 3 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0318 17:09:37.559995 434971 task_exit.go:204] [ 2487( 586): 2487( 586)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.560048 434971 task_exit.go:204] [ 2487( 586): 2487( 586)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.560077 434971 task_signals.go:204] [ 2487( 586): 2490( 587)] Signal 9, PID: 2487, TID: 2490, fault addr: 0x0: terminating thread group D0318 17:09:37.560094 434971 task_exit.go:204] [ 2487( 586): 2490( 587)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.560229 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.560257 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 38 D0318 17:09:37.560269 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.560423 434971 task_exit.go:204] [ 2487( 586): 2490( 587)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.560455 434971 task_exit.go:204] [ 2487( 586): 2490( 587)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.560468 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.560623 434971 task_exit.go:204] [ 2487( 586): 2487( 586)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 2: pipe2$9p(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) write$tun(r0, 0x0, 0x0) D0318 17:09:37.563835 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559ca028900:sysno 83 D0318 17:09:37.563865 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 10 D0318 17:09:37.563875 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559ca028900 trap addr 66320 ([184 83 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0318 17:09:37.564235 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffb870:sysno 90 D0318 17:09:37.564263 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 11 D0318 17:09:37.564280 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffb870 trap addr 66370 ([184 90 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0318 17:09:37.564319 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffbd20:sysno 80 D0318 17:09:37.564338 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 12 D0318 17:09:37.564345 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffbd20 trap addr 663c0 ([184 80 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0318 17:09:37.564378 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9fc02b8:sysno 13 D0318 17:09:37.564385 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 13 D0318 17:09:37.564392 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9fc02b8 trap addr 66410 ([184 13 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0318 17:09:37.567780 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffbcf0:sysno 33 D0318 17:09:37.567798 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 14 D0318 17:09:37.567809 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffbcf0 trap addr 66460 ([184 33 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0318 17:09:37.567964 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.567992 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 37 D0318 17:09:37.568103 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.568574 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.568588 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 38 D0318 17:09:37.568597 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.576554 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ffe500:sysno 272 D0318 17:09:37.576610 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 15 D0318 17:09:37.576623 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ffe500 trap addr 664b0 ([184 16 1 0 0 15 5] -> [255 36 37 176 100 6 0]) D0318 17:09:37.576757 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ff9dcc:sysno 56 D0318 17:09:37.576777 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 16 D0318 17:09:37.576786 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ff9dcc trap addr 66500 ([184 56 0 0 0 15 5] -> [255 36 37 0 101 6 0]) D0318 17:09:37.580840 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.580879 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 39 D0318 17:09:37.580926 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.581138 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.581171 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 40 D0318 17:09:37.581183 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.581612 434971 usertrap_amd64.go:212] [ 2488( 48): 2493( 49)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.581644 434971 usertrap_amd64.go:122] [ 2488( 48): 2493( 49)] Allocate a new trap: 0xc0016a5cb0 41 D0318 17:09:37.581658 434971 usertrap_amd64.go:225] [ 2488( 48): 2493( 49)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.584508 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ff9e06:sysno 273 D0318 17:09:37.584547 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 17 D0318 17:09:37.584732 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ff9e06 trap addr 66550 ([184 17 1 0 0 15 5] -> [255 36 37 80 101 6 0]) D0318 17:09:37.588835 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffe4a3:sysno 165 D0318 17:09:37.588956 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 18 D0318 17:09:37.589008 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffe4a3 trap addr 665a0 ([184 165 0 0 0 15 5] -> [255 36 37 160 101 6 0]) D0318 17:09:37.589418 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.589469 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 39 D0318 17:09:37.589514 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.589587 434971 usertrap_amd64.go:212] [ 2489: 2489] Found the pattern at ip 5559c9ff978c:sysno 61 D0318 17:09:37.589865 434971 usertrap_amd64.go:122] [ 2489: 2489] Allocate a new trap: 0xc001194000 17 D0318 17:09:37.590071 434971 usertrap_amd64.go:225] [ 2489: 2489] Apply the binary patch addr 5559c9ff978c trap addr 66550 ([184 61 0 0 0 15 5] -> [255 36 37 80 101 6 0]) D0318 17:09:37.589706 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffa560:sysno 112 D0318 17:09:37.590267 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 19 D0318 17:09:37.590344 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffa560 trap addr 665f0 ([184 112 0 0 0 15 5] -> [255 36 37 240 101 6 0]) D0318 17:09:37.591519 434971 usertrap_amd64.go:212] [ 2488( 48): 2488( 48)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.591537 434971 usertrap_amd64.go:122] [ 2488( 48): 2488( 48)] Allocate a new trap: 0xc0016a5cb0 42 D0318 17:09:37.591547 434971 usertrap_amd64.go:225] [ 2488( 48): 2488( 48)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.592207 434971 task_exit.go:204] [ 2488( 48): 2488( 48)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.592336 434971 task_signals.go:204] [ 2488( 48): 2493( 49)] Signal 9, PID: 2488, TID: 2493, fault addr: 0x0: terminating thread group D0318 17:09:37.592392 434971 task_exit.go:204] [ 2488( 48): 2493( 49)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.592437 434971 task_exit.go:204] [ 2488( 48): 2488( 48)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.592721 434971 task_exit.go:204] [ 2488( 48): 2493( 49)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.592744 434971 task_exit.go:204] [ 2488( 48): 2493( 49)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.592755 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.592943 434971 task_exit.go:204] [ 2488( 48): 2488( 48)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) recvmsg$inet_nvme(r2, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x20) D0318 17:09:37.594203 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.594231 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 40 D0318 17:09:37.594242 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.594375 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffb91a:sysno 257 D0318 17:09:37.594681 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 20 D0318 17:09:37.594493 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.594787 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 41 D0318 17:09:37.594805 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.594825 434971 usertrap_amd64.go:212] [ 2491( 588): 2494( 589)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.594847 434971 usertrap_amd64.go:122] [ 2491( 588): 2494( 589)] Allocate a new trap: 0xc0016a5ce0 42 D0318 17:09:37.594856 434971 usertrap_amd64.go:225] [ 2491( 588): 2494( 589)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.594750 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffb91a trap addr 66640 ([184 1 1 0 0 15 5] -> [255 36 37 64 102 6 0]) D0318 17:09:37.596460 434971 usertrap_amd64.go:212] [ 2491( 588): 2491( 588)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.596494 434971 usertrap_amd64.go:122] [ 2491( 588): 2491( 588)] Allocate a new trap: 0xc0016a5ce0 43 D0318 17:09:37.596504 434971 usertrap_amd64.go:225] [ 2491( 588): 2491( 588)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.597171 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffbaa9:sysno 1 D0318 17:09:37.597204 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 21 D0318 17:09:37.597214 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffbaa9 trap addr 66690 ([184 1 0 0 0 15 5] -> [255 36 37 144 102 6 0]) D0318 17:09:37.597744 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffeb20:sysno 41 D0318 17:09:37.597773 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 22 D0318 17:09:37.598186 434971 task_exit.go:204] [ 2491( 588): 2491( 588)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.598214 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffeb20 trap addr 666e0 ([184 41 0 0 0 15 5] -> [255 36 37 224 102 6 0]) D0318 17:09:37.598331 434971 task_exit.go:204] [ 2491( 588): 2491( 588)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.598354 434971 task_signals.go:204] [ 2491( 588): 2494( 589)] Signal 9, PID: 2491, TID: 2494, fault addr: 0x0: terminating thread group D0318 17:09:37.598367 434971 task_exit.go:204] [ 2491( 588): 2494( 589)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.598886 434971 task_exit.go:204] [ 2491( 588): 2494( 589)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.598903 434971 task_exit.go:204] [ 2491( 588): 2494( 589)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.598913 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.599838 434971 task_exit.go:204] [ 2491( 588): 2491( 588)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 2: r0 = msgget(0x3, 0x0) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/4096}, 0x1008, 0x2, 0x2000) msgsnd(0x0, 0x0, 0x0, 0x0) D0318 17:09:37.603863 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffcb04:sysno 16 D0318 17:09:37.603894 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 23 D0318 17:09:37.603904 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffcb04 trap addr 66730 ([184 16 0 0 0 15 5] -> [255 36 37 48 103 6 0]) D0318 17:09:37.604638 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffc660:sysno 3 D0318 17:09:37.604666 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 24 D0318 17:09:37.604678 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffc660 trap addr 66780 ([184 3 0 0 0 15 5] -> [255 36 37 128 103 6 0]) D0318 17:09:37.604839 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffea3c:sysno 44 D0318 17:09:37.604873 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 25 D0318 17:09:37.604888 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffea3c trap addr 667d0 ([184 44 0 0 0 15 5] -> [255 36 37 208 103 6 0]) D0318 17:09:37.605217 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffe982:sysno 45 D0318 17:09:37.605908 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 26 D0318 17:09:37.605997 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffe982 trap addr 66820 ([184 45 0 0 0 15 5] -> [255 36 37 32 104 6 0]) W0318 17:09:37.606531 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.606737 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.609856 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.609895 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 36 W0318 17:09:37.610015 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.610036 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) W0318 17:09:37.610059 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610079 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610097 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610138 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610305 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610541 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610686 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610811 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.610945 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611035 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611097 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611120 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611139 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611160 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611181 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611202 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611390 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.611799 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a D0318 17:09:37.613373 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.613400 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 37 D0318 17:09:37.613411 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) W0318 17:09:37.615792 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.615973 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.616100 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.616210 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.616297 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.616342 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.617135 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.617343 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.617435 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.617493 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.617549 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.617617 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.617720 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: a W0318 17:09:37.617783 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.617920 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.618076 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.618323 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.618555 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 D0318 17:09:37.618559 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.618680 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 38 D0318 17:09:37.618697 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) W0318 17:09:37.619265 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.619344 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.619469 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.619662 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.620131 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.620410 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.620667 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.620829 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.620926 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.621039 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 D0318 17:09:37.621086 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.621117 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 39 D0318 17:09:37.621130 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) W0318 17:09:37.621215 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 D0318 17:09:37.621241 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.621473 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 40 D0318 17:09:37.621507 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.621535 434971 usertrap_amd64.go:212] [ 2495( 50): 2497( 51)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.621558 434971 usertrap_amd64.go:122] [ 2495( 50): 2497( 51)] Allocate a new trap: 0xc0016a5dd0 41 D0318 17:09:37.621568 434971 usertrap_amd64.go:225] [ 2495( 50): 2497( 51)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) W0318 17:09:37.621666 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.621774 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 12 W0318 17:09:37.622270 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.622731 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.622876 434971 usertrap_amd64.go:212] [ 2495( 50): 2495( 50)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.622904 434971 usertrap_amd64.go:122] [ 2495( 50): 2495( 50)] Allocate a new trap: 0xc0016a5dd0 42 D0318 17:09:37.622918 434971 usertrap_amd64.go:225] [ 2495( 50): 2495( 50)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) W0318 17:09:37.623750 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.624331 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.624774 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.624917 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625015 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625086 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625153 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625220 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625307 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625376 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625454 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625529 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625609 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625694 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.625914 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.626314 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.626472 434971 task_exit.go:204] [ 2495( 50): 2495( 50)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.626517 434971 task_exit.go:204] [ 2495( 50): 2495( 50)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.626538 434971 task_signals.go:204] [ 2495( 50): 2497( 51)] Signal 9, PID: 2495, TID: 2497, fault addr: 0x0: terminating thread group D0318 17:09:37.626565 434971 task_exit.go:204] [ 2495( 50): 2497( 51)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.626806 434971 task_exit.go:204] [ 2495( 50): 2497( 51)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.626836 434971 task_exit.go:204] [ 2495( 50): 2497( 51)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.626846 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.627452 434971 task_exit.go:204] [ 2495( 50): 2495( 50)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 0: pipe2$9p(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) write$tun(r0, 0x0, 0x0) D0318 17:09:37.629028 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.629070 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 37 D0318 17:09:37.629207 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.631451 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.631509 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 38 D0318 17:09:37.631532 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) W0318 17:09:37.637539 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.637675 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.637784 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.638315 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.638578 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.638866 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.639259 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.639337 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 39 D0318 17:09:37.639359 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) W0318 17:09:37.639557 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.639728 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.639880 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.639949 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.640012 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.640839 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.641009 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642077 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642251 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642430 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642670 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642769 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642849 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.642939 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.643015 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.643101 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.643280 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.643374 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 W0318 17:09:37.643457 434971 protocol.go:200] [ 2492( 1): 2492( 1)] unexpected attribute: 1 D0318 17:09:37.643727 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffb8a0:sysno 258 D0318 17:09:37.643753 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 27 D0318 17:09:37.643765 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffb8a0 trap addr 66870 ([184 2 1 0 0 15 5] -> [255 36 37 112 104 6 0]) D0318 17:09:37.644168 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.644194 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 40 D0318 17:09:37.644204 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.644410 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.644438 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 41 D0318 17:09:37.644453 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.644699 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffe943:sysno 55 D0318 17:09:37.644728 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 28 D0318 17:09:37.644741 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffe943 trap addr 668c0 ([184 55 0 0 0 15 5] -> [255 36 37 192 104 6 0]) D0318 17:09:37.645355 434971 usertrap_amd64.go:212] [ 2496( 590): 2499( 591)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.645428 434971 usertrap_amd64.go:122] [ 2496( 590): 2499( 591)] Allocate a new trap: 0xc000617d70 42 D0318 17:09:37.645461 434971 usertrap_amd64.go:225] [ 2496( 590): 2499( 591)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) 17:09:37 executing program 1: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) close(r0) D0318 17:09:37.647926 434971 usertrap_amd64.go:212] [ 2496( 590): 2496( 590)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.647952 434971 usertrap_amd64.go:122] [ 2496( 590): 2496( 590)] Allocate a new trap: 0xc000617d70 43 D0318 17:09:37.647963 434971 usertrap_amd64.go:225] [ 2496( 590): 2496( 590)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.648872 434971 task_exit.go:204] [ 2496( 590): 2496( 590)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.648912 434971 task_signals.go:204] [ 2496( 590): 2499( 591)] Signal 9, PID: 2496, TID: 2499, fault addr: 0x0: terminating thread group D0318 17:09:37.648923 434971 task_exit.go:204] [ 2496( 590): 2496( 590)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.648942 434971 task_exit.go:204] [ 2496( 590): 2499( 591)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.649494 434971 task_exit.go:204] [ 2496( 590): 2499( 591)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.649603 434971 task_exit.go:204] [ 2496( 590): 2499( 591)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.649658 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.649977 434971 task_exit.go:204] [ 2496( 590): 2496( 590)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000003540), 0x0, 0x0) read$char_usb(r0, 0x0, 0xfffffd1c) D0318 17:09:37.652910 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.653001 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 36 D0318 17:09:37.653153 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.654009 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ff978c:sysno 61 D0318 17:09:37.654081 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 29 D0318 17:09:37.654217 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ff978c trap addr 66910 ([184 61 0 0 0 15 5] -> [255 36 37 16 105 6 0]) D0318 17:09:37.655140 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.655308 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 37 D0318 17:09:37.655339 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.655275 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559ca02816c:sysno 230 D0318 17:09:37.655418 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 30 D0318 17:09:37.655429 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559ca02816c trap addr 66960 ([184 230 0 0 0 15 5] -> [255 36 37 96 105 6 0]) D0318 17:09:37.657045 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.657129 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 29 D0318 17:09:37.657231 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559ca028860 trap addr 66910 ([184 109 0 0 0 15 5] -> [255 36 37 16 105 6 0]) D0318 17:09:37.658360 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.658537 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 30 D0318 17:09:37.658615 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559c9ffc520 trap addr 66960 ([184 10 1 0 0 15 5] -> [255 36 37 96 105 6 0]) D0318 17:09:37.660565 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.660601 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 38 D0318 17:09:37.660613 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.662518 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.662539 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 39 D0318 17:09:37.662547 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.662694 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.662716 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 40 D0318 17:09:37.662724 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.662866 434971 usertrap_amd64.go:212] [ 2498( 52): 2502( 53)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.663279 434971 usertrap_amd64.go:122] [ 2498( 52): 2502( 53)] Allocate a new trap: 0xc001405bc0 41 D0318 17:09:37.663314 434971 usertrap_amd64.go:225] [ 2498( 52): 2502( 53)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.664457 434971 usertrap_amd64.go:212] [ 2498( 52): 2498( 52)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.664534 434971 usertrap_amd64.go:122] [ 2498( 52): 2498( 52)] Allocate a new trap: 0xc001405bc0 42 D0318 17:09:37.664557 434971 usertrap_amd64.go:225] [ 2498( 52): 2498( 52)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.665122 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.665150 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 37 D0318 17:09:37.665237 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.666077 434971 task_exit.go:204] [ 2498( 52): 2498( 52)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.666206 434971 task_exit.go:204] [ 2498( 52): 2498( 52)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.666205 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.666245 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 38 D0318 17:09:37.666247 434971 task_signals.go:204] [ 2498( 52): 2502( 53)] Signal 9, PID: 2498, TID: 2502, fault addr: 0x0: terminating thread group D0318 17:09:37.666258 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.666266 434971 task_exit.go:204] [ 2498( 52): 2502( 53)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.666539 434971 task_exit.go:204] [ 2498( 52): 2502( 53)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.666608 434971 task_exit.go:204] [ 2498( 52): 2502( 53)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.666689 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.668114 434971 task_exit.go:204] [ 2498( 52): 2498( 52)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.668624 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.668654 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 31 D0318 17:09:37.668664 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559c9fd1ca2 trap addr 669b0 ([184 14 0 0 0 15 5] -> [255 36 37 176 105 6 0]) 17:09:37 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) D0318 17:09:37.669655 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.669687 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 39 D0318 17:09:37.669696 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.672129 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.672206 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 40 D0318 17:09:37.672291 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.672481 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.672513 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 41 D0318 17:09:37.672523 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.672728 434971 usertrap_amd64.go:212] [ 2501( 592): 2504( 593)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.672813 434971 usertrap_amd64.go:122] [ 2501( 592): 2504( 593)] Allocate a new trap: 0xc008058810 42 D0318 17:09:37.672845 434971 usertrap_amd64.go:225] [ 2501( 592): 2504( 593)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.673541 434971 usertrap_amd64.go:212] [ 2501( 592): 2501( 592)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.673568 434971 usertrap_amd64.go:122] [ 2501( 592): 2501( 592)] Allocate a new trap: 0xc008058810 43 D0318 17:09:37.673577 434971 usertrap_amd64.go:225] [ 2501( 592): 2501( 592)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.674490 434971 task_exit.go:204] [ 2501( 592): 2501( 592)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.674532 434971 task_exit.go:204] [ 2501( 592): 2501( 592)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.674551 434971 task_signals.go:204] [ 2501( 592): 2504( 593)] Signal 9, PID: 2501, TID: 2504, fault addr: 0x0: terminating thread group D0318 17:09:37.674564 434971 task_exit.go:204] [ 2501( 592): 2504( 593)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.674849 434971 task_exit.go:204] [ 2501( 592): 2504( 593)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.674895 434971 task_exit.go:204] [ 2501( 592): 2504( 593)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.674913 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.675000 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.675039 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 36 D0318 17:09:37.675107 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.675233 434971 task_exit.go:204] [ 2501( 592): 2501( 592)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:37.677239 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.677269 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 37 D0318 17:09:37.677280 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.681408 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.681439 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 37 D0318 17:09:37.681580 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.681881 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.681944 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 32 D0318 17:09:37.681976 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559ca028b92 trap addr 66a00 ([184 179 1 0 0 15 5] -> [255 36 37 0 106 6 0]) D0318 17:09:37.682189 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.682249 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 33 D0318 17:09:37.682291 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559c9fd1c10 trap addr 66a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 106 6 0]) D0318 17:09:37.682314 434971 usertrap_amd64.go:212] [ 2500( 2): 2506( 3)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.682388 434971 usertrap_amd64.go:122] [ 2500( 2): 2506( 3)] Allocate a new trap: 0xc0080587e0 34 D0318 17:09:37.682422 434971 usertrap_amd64.go:225] [ 2500( 2): 2506( 3)] Apply the binary patch addr 5559c9fd1320 trap addr 66aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 106 6 0]) D0318 17:09:37.682928 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.682958 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 38 D0318 17:09:37.682969 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.683005 434971 usertrap_amd64.go:212] [ 2500( 2): 2500( 2)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.683033 434971 usertrap_amd64.go:122] [ 2500( 2): 2500( 2)] Allocate a new trap: 0xc0080587e0 35 D0318 17:09:37.683047 434971 usertrap_amd64.go:225] [ 2500( 2): 2500( 2)] Apply the binary patch addr 5559c9ffbc93 trap addr 66af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 106 6 0]) D0318 17:09:37.683114 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.683144 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 38 D0318 17:09:37.683155 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.684028 434971 task_exit.go:204] [ 2500( 2): 2500( 2)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.684073 434971 task_exit.go:204] [ 2500( 2): 2500( 2)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.684100 434971 task_signals.go:204] [ 2500( 2): 2506( 3)] Signal 9, PID: 2500, TID: 2506, fault addr: 0x0: terminating thread group D0318 17:09:37.684124 434971 task_exit.go:204] [ 2500( 2): 2506( 3)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.684643 434971 task_exit.go:204] [ 2500( 2): 2506( 3)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.684702 434971 task_exit.go:204] [ 2500( 2): 2506( 3)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.684714 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.685732 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.685757 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 39 D0318 17:09:37.685773 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.685781 434971 task_exit.go:204] [ 2500( 2): 2500( 2)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.685918 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.685941 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 40 D0318 17:09:37.685950 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.686100 434971 usertrap_amd64.go:212] [ 2503( 54): 2507( 55)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.686132 434971 usertrap_amd64.go:122] [ 2503( 54): 2507( 55)] Allocate a new trap: 0xc0084c2de0 41 D0318 17:09:37.686143 434971 usertrap_amd64.go:225] [ 2503( 54): 2507( 55)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.686470 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffe0d0:sysno 166 D0318 17:09:37.686497 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 31 D0318 17:09:37.686508 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffe0d0 trap addr 669b0 ([184 166 0 0 0 15 5] -> [255 36 37 176 105 6 0]) D0318 17:09:37.686640 434971 usertrap_amd64.go:212] [ 2503( 54): 2503( 54)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.686667 434971 usertrap_amd64.go:122] [ 2503( 54): 2503( 54)] Allocate a new trap: 0xc0084c2de0 42 D0318 17:09:37.686676 434971 usertrap_amd64.go:225] [ 2503( 54): 2503( 54)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.686937 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffb843:sysno 262 D0318 17:09:37.686968 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 32 D0318 17:09:37.686982 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffb843 trap addr 66a00 ([184 6 1 0 0 15 5] -> [255 36 37 0 106 6 0]) D0318 17:09:37.687133 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.687170 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 39 D0318 17:09:37.687184 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.688008 434971 task_exit.go:204] [ 2503( 54): 2503( 54)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.688046 434971 task_exit.go:204] [ 2503( 54): 2503( 54)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.688063 434971 task_signals.go:204] [ 2503( 54): 2507( 55)] Signal 9, PID: 2503, TID: 2507, fault addr: 0x0: terminating thread group D0318 17:09:37.688079 434971 task_exit.go:204] [ 2503( 54): 2507( 55)] Transitioning from exit state TaskExitNone to TaskExitInitiated 17:09:37 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x0, 0x0) ftruncate(r0, 0x0) D0318 17:09:37.688350 434971 task_exit.go:204] [ 2503( 54): 2507( 55)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.688380 434971 task_exit.go:204] [ 2503( 54): 2507( 55)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.688390 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.689142 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.689168 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 40 D0318 17:09:37.689177 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.689308 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.689380 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 41 D0318 17:09:37.689403 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.689411 434971 task_exit.go:204] [ 2503( 54): 2503( 54)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.689441 434971 usertrap_amd64.go:212] [ 2505( 594): 2508( 595)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.689461 434971 usertrap_amd64.go:122] [ 2505( 594): 2508( 595)] Allocate a new trap: 0xc000b1cd80 42 D0318 17:09:37.689468 434971 usertrap_amd64.go:225] [ 2505( 594): 2508( 595)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.690298 434971 usertrap_amd64.go:212] [ 2505( 594): 2505( 594)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.690325 434971 usertrap_amd64.go:122] [ 2505( 594): 2505( 594)] Allocate a new trap: 0xc000b1cd80 43 D0318 17:09:37.690338 434971 usertrap_amd64.go:225] [ 2505( 594): 2505( 594)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.691221 434971 task_exit.go:204] [ 2505( 594): 2505( 594)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.691259 434971 task_exit.go:204] [ 2505( 594): 2505( 594)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.691285 434971 task_signals.go:204] [ 2505( 594): 2508( 595)] Signal 9, PID: 2505, TID: 2508, fault addr: 0x0: terminating thread group D0318 17:09:37.691307 434971 task_exit.go:204] [ 2505( 594): 2508( 595)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.691586 434971 task_exit.go:204] [ 2505( 594): 2508( 595)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.691668 434971 task_exit.go:204] [ 2505( 594): 2508( 595)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.691686 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.691906 434971 task_exit.go:204] [ 2505( 594): 2505( 594)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 0: semget$private(0x0, 0x1, 0x28) 17:09:37 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, 0x0, 0x0) D0318 17:09:37.696401 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559ca02829c:sysno 217 D0318 17:09:37.696432 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 33 D0318 17:09:37.696443 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559ca02829c trap addr 66a50 ([184 217 0 0 0 15 5] -> [255 36 37 80 106 6 0]) D0318 17:09:37.697279 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffc550:sysno 87 D0318 17:09:37.697308 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 34 D0318 17:09:37.697318 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffc550 trap addr 66aa0 ([184 87 0 0 0 15 5] -> [255 36 37 160 106 6 0]) D0318 17:09:37.697403 434971 usertrap_amd64.go:212] [ 2492( 1): 2492( 1)] Found the pattern at ip 5559c9ffc580:sysno 263 D0318 17:09:37.697423 434971 usertrap_amd64.go:122] [ 2492( 1): 2492( 1)] Allocate a new trap: 0xc000b6f500 35 D0318 17:09:37.697431 434971 usertrap_amd64.go:225] [ 2492( 1): 2492( 1)] Apply the binary patch addr 5559c9ffc580 trap addr 66af0 ([184 7 1 0 0 15 5] -> [255 36 37 240 106 6 0]) D0318 17:09:37.701324 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.701347 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 36 D0318 17:09:37.701411 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.701804 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.701820 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 36 D0318 17:09:37.701920 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:37.702248 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.702285 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 37 D0318 17:09:37.702384 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.702804 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.702884 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 37 D0318 17:09:37.702905 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.702911 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.702946 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 37 D0318 17:09:37.702961 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:37.703219 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.703293 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 38 D0318 17:09:37.703327 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.706030 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.706058 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 38 D0318 17:09:37.706069 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:37.707514 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.707532 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 39 D0318 17:09:37.707542 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.708093 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.708126 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 39 D0318 17:09:37.708141 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:37.708306 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.708328 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 38 D0318 17:09:37.708339 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.708393 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.708420 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 40 D0318 17:09:37.708431 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:37.708454 434971 usertrap_amd64.go:212] [ 2511( 4): 2512( 5)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.708460 434971 usertrap_amd64.go:122] [ 2511( 4): 2512( 5)] Allocate a new trap: 0xc008349470 41 D0318 17:09:37.708465 434971 usertrap_amd64.go:225] [ 2511( 4): 2512( 5)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:37.708915 434971 usertrap_amd64.go:212] [ 2511( 4): 2511( 4)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.708929 434971 usertrap_amd64.go:122] [ 2511( 4): 2511( 4)] Allocate a new trap: 0xc008349470 42 D0318 17:09:37.708938 434971 usertrap_amd64.go:225] [ 2511( 4): 2511( 4)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:37.710019 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.710048 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 40 D0318 17:09:37.710058 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.710205 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.710227 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 41 D0318 17:09:37.710238 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.710299 434971 usertrap_amd64.go:212] [ 2510( 596): 2513( 597)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.710350 434971 usertrap_amd64.go:122] [ 2510( 596): 2513( 597)] Allocate a new trap: 0xc0084c2e40 42 D0318 17:09:37.710382 434971 usertrap_amd64.go:225] [ 2510( 596): 2513( 597)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.710520 434971 task_exit.go:204] [ 2511( 4): 2511( 4)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.710568 434971 task_exit.go:204] [ 2511( 4): 2511( 4)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.710568 434971 task_signals.go:204] [ 2511( 4): 2512( 5)] Signal 9, PID: 2511, TID: 2512, fault addr: 0x0: terminating thread group D0318 17:09:37.710636 434971 task_exit.go:204] [ 2511( 4): 2512( 5)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.710945 434971 task_exit.go:204] [ 2511( 4): 2512( 5)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.710971 434971 task_exit.go:204] [ 2511( 4): 2512( 5)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.710981 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.711351 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.711473 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 39 D0318 17:09:37.711491 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.711411 434971 usertrap_amd64.go:212] [ 2510( 596): 2510( 596)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.711533 434971 usertrap_amd64.go:122] [ 2510( 596): 2510( 596)] Allocate a new trap: 0xc0084c2e40 43 D0318 17:09:37.711540 434971 usertrap_amd64.go:225] [ 2510( 596): 2510( 596)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.711740 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.711753 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 40 D0318 17:09:37.711761 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.711903 434971 usertrap_amd64.go:212] [ 2509( 56): 2514( 57)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.711961 434971 usertrap_amd64.go:122] [ 2509( 56): 2514( 57)] Allocate a new trap: 0xc0080588a0 41 D0318 17:09:37.711983 434971 usertrap_amd64.go:225] [ 2509( 56): 2514( 57)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.711984 434971 task_exit.go:204] [ 2511( 4): 2511( 4)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:37.712423 434971 usertrap_amd64.go:212] [ 2509( 56): 2509( 56)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.712438 434971 usertrap_amd64.go:122] [ 2509( 56): 2509( 56)] Allocate a new trap: 0xc0080588a0 42 D0318 17:09:37.712448 434971 usertrap_amd64.go:225] [ 2509( 56): 2509( 56)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.713149 434971 task_exit.go:204] [ 2510( 596): 2510( 596)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.713195 434971 task_exit.go:204] [ 2510( 596): 2510( 596)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.713235 434971 task_signals.go:204] [ 2510( 596): 2513( 597)] Signal 9, PID: 2510, TID: 2513, fault addr: 0x0: terminating thread group D0318 17:09:37.713257 434971 task_exit.go:204] [ 2510( 596): 2513( 597)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.713356 434971 task_exit.go:204] [ 2509( 56): 2509( 56)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.713391 434971 task_exit.go:204] [ 2509( 56): 2509( 56)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.713435 434971 task_signals.go:204] [ 2509( 56): 2514( 57)] Signal 9, PID: 2509, TID: 2514, fault addr: 0x0: terminating thread group D0318 17:09:37.713454 434971 task_exit.go:204] [ 2509( 56): 2514( 57)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.713773 434971 task_exit.go:204] [ 2510( 596): 2513( 597)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.713867 434971 task_exit.go:204] [ 2510( 596): 2513( 597)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.713892 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.714054 434971 task_exit.go:204] [ 2509( 56): 2514( 57)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.714087 434971 task_exit.go:204] [ 2509( 56): 2514( 57)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.714096 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.714591 434971 task_exit.go:204] [ 2509( 56): 2509( 56)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.714645 434971 task_exit.go:204] [ 2510( 596): 2510( 596)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 2: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:09:37 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) D0318 17:09:37.717714 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.717743 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 36 D0318 17:09:37.717842 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:37.718669 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.718696 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 37 D0318 17:09:37.718706 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:37.721267 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.721357 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 38 D0318 17:09:37.721430 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:37.723764 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.723781 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 39 D0318 17:09:37.723790 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:37.723952 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.723975 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 40 D0318 17:09:37.723984 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:37.724109 434971 usertrap_amd64.go:212] [ 2515( 6): 2517( 7)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.724126 434971 usertrap_amd64.go:122] [ 2515( 6): 2517( 7)] Allocate a new trap: 0xc001195110 41 D0318 17:09:37.724134 434971 usertrap_amd64.go:225] [ 2515( 6): 2517( 7)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:37.724143 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.724150 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 36 D0318 17:09:37.724217 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.725010 434971 usertrap_amd64.go:212] [ 2515( 6): 2515( 6)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.725088 434971 usertrap_amd64.go:122] [ 2515( 6): 2515( 6)] Allocate a new trap: 0xc001195110 42 D0318 17:09:37.725103 434971 usertrap_amd64.go:225] [ 2515( 6): 2515( 6)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:37.725311 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.725338 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 37 D0318 17:09:37.725355 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.725825 434971 task_exit.go:204] [ 2515( 6): 2515( 6)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.725866 434971 task_exit.go:204] [ 2515( 6): 2515( 6)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.725890 434971 task_signals.go:204] [ 2515( 6): 2517( 7)] Signal 9, PID: 2515, TID: 2517, fault addr: 0x0: terminating thread group D0318 17:09:37.725902 434971 task_exit.go:204] [ 2515( 6): 2517( 7)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.726176 434971 task_exit.go:204] [ 2515( 6): 2517( 7)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.726249 434971 task_exit.go:204] [ 2515( 6): 2517( 7)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.726346 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.726417 434971 task_exit.go:204] [ 2515( 6): 2515( 6)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) D0318 17:09:37.730249 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.730285 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 38 D0318 17:09:37.730296 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.733517 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.733549 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 39 D0318 17:09:37.733560 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.733820 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.733846 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 40 D0318 17:09:37.733857 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.733976 434971 usertrap_amd64.go:212] [ 2516( 58): 2520( 59)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.734037 434971 usertrap_amd64.go:122] [ 2516( 58): 2520( 59)] Allocate a new trap: 0xc001405d10 41 D0318 17:09:37.734069 434971 usertrap_amd64.go:225] [ 2516( 58): 2520( 59)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.734297 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.734340 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 36 D0318 17:09:37.734419 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:37.734826 434971 usertrap_amd64.go:212] [ 2516( 58): 2516( 58)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.734855 434971 usertrap_amd64.go:122] [ 2516( 58): 2516( 58)] Allocate a new trap: 0xc001405d10 42 D0318 17:09:37.734866 434971 usertrap_amd64.go:225] [ 2516( 58): 2516( 58)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.735197 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.735227 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 37 D0318 17:09:37.735236 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:37.736040 434971 task_exit.go:204] [ 2516( 58): 2516( 58)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.736122 434971 task_exit.go:204] [ 2516( 58): 2516( 58)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.736165 434971 task_signals.go:204] [ 2516( 58): 2520( 59)] Signal 9, PID: 2516, TID: 2520, fault addr: 0x0: terminating thread group D0318 17:09:37.736181 434971 task_exit.go:204] [ 2516( 58): 2520( 59)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.736487 434971 task_exit.go:204] [ 2516( 58): 2520( 59)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.736513 434971 task_exit.go:204] [ 2516( 58): 2520( 59)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.736523 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.737836 434971 task_exit.go:204] [ 2516( 58): 2516( 58)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:37.738505 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.738561 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 38 D0318 17:09:37.738613 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:37.741882 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.741913 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 39 D0318 17:09:37.741923 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:37.742136 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.742201 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 40 D0318 17:09:37.742218 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:37.742302 434971 usertrap_amd64.go:212] [ 2518( 8): 2522( 9)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.742335 434971 usertrap_amd64.go:122] [ 2518( 8): 2522( 9)] Allocate a new trap: 0xc0083c85d0 41 D0318 17:09:37.742351 434971 usertrap_amd64.go:225] [ 2518( 8): 2522( 9)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:37.743176 434971 usertrap_amd64.go:212] [ 2518( 8): 2518( 8)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.743206 434971 usertrap_amd64.go:122] [ 2518( 8): 2518( 8)] Allocate a new trap: 0xc0083c85d0 42 D0318 17:09:37.743218 434971 usertrap_amd64.go:225] [ 2518( 8): 2518( 8)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:37.744141 434971 task_exit.go:204] [ 2518( 8): 2518( 8)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.744180 434971 task_exit.go:204] [ 2518( 8): 2518( 8)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.744198 434971 task_signals.go:204] [ 2518( 8): 2522( 9)] Signal 9, PID: 2518, TID: 2522, fault addr: 0x0: terminating thread group D0318 17:09:37.744209 434971 task_exit.go:204] [ 2518( 8): 2522( 9)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.744268 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.744296 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 36 D0318 17:09:37.744373 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.744468 434971 task_exit.go:204] [ 2518( 8): 2522( 9)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.744495 434971 task_exit.go:204] [ 2518( 8): 2522( 9)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.744504 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.745002 434971 task_exit.go:204] [ 2518( 8): 2518( 8)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) openat$cgroup_type(r0, &(0x7f0000000080), 0x2, 0x0) D0318 17:09:37.745793 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.745816 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 37 D0318 17:09:37.745823 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.749423 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:37.749500 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 37 D0318 17:09:37.749597 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:37.750692 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:37.750721 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 38 D0318 17:09:37.750731 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:37.751112 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.751159 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 36 D0318 17:09:37.751282 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:37.752218 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.752303 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 38 D0318 17:09:37.752389 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.752545 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.752575 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 37 D0318 17:09:37.752590 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:37.755218 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:37.755347 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 39 D0318 17:09:37.755381 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:37.757137 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.757195 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 39 D0318 17:09:37.757211 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.757266 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.757277 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 38 D0318 17:09:37.757287 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:37.757438 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.757466 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 40 D0318 17:09:37.757479 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.757673 434971 usertrap_amd64.go:212] [ 2521( 60): 2524( 61)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.757700 434971 usertrap_amd64.go:122] [ 2521( 60): 2524( 61)] Allocate a new trap: 0xc0083c8600 41 D0318 17:09:37.757714 434971 usertrap_amd64.go:225] [ 2521( 60): 2524( 61)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.758344 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:37.758371 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 40 D0318 17:09:37.758386 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:37.758589 434971 usertrap_amd64.go:212] [ 2521( 60): 2521( 60)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.758651 434971 usertrap_amd64.go:122] [ 2521( 60): 2521( 60)] Allocate a new trap: 0xc0083c8600 42 D0318 17:09:37.758719 434971 usertrap_amd64.go:225] [ 2521( 60): 2521( 60)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.758700 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:37.758874 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 41 D0318 17:09:37.758891 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:37.760427 434971 task_exit.go:204] [ 2521( 60): 2521( 60)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.760507 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.760524 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 39 D0318 17:09:37.760533 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:37.760586 434971 task_signals.go:204] [ 2521( 60): 2524( 61)] Signal 9, PID: 2521, TID: 2524, fault addr: 0x0: terminating thread group D0318 17:09:37.760604 434971 task_exit.go:204] [ 2521( 60): 2521( 60)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.760728 434971 task_exit.go:204] [ 2521( 60): 2524( 61)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.760819 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.760847 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 40 D0318 17:09:37.760856 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:37.760990 434971 usertrap_amd64.go:212] [ 2523( 10): 2526( 11)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.761020 434971 usertrap_amd64.go:122] [ 2523( 10): 2526( 11)] Allocate a new trap: 0xc001195140 41 D0318 17:09:37.761031 434971 usertrap_amd64.go:225] [ 2523( 10): 2526( 11)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:37.761305 434971 task_exit.go:204] [ 2521( 60): 2524( 61)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.761336 434971 task_exit.go:204] [ 2521( 60): 2524( 61)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.761347 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.762515 434971 task_exit.go:204] [ 2521( 60): 2521( 60)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.762482 434971 usertrap_amd64.go:212] [ 2519( 598): 2525( 599)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:37.762659 434971 usertrap_amd64.go:122] [ 2519( 598): 2525( 599)] Allocate a new trap: 0xc0083494d0 42 D0318 17:09:37.762690 434971 usertrap_amd64.go:225] [ 2519( 598): 2525( 599)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:37.762783 434971 usertrap_amd64.go:212] [ 2523( 10): 2523( 10)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.762814 434971 usertrap_amd64.go:122] [ 2523( 10): 2523( 10)] Allocate a new trap: 0xc001195140 42 D0318 17:09:37.762828 434971 usertrap_amd64.go:225] [ 2523( 10): 2523( 10)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:37.763164 434971 usertrap_amd64.go:212] [ 2519( 598): 2519( 598)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:37.763194 434971 usertrap_amd64.go:122] [ 2519( 598): 2519( 598)] Allocate a new trap: 0xc0083494d0 43 D0318 17:09:37.763209 434971 usertrap_amd64.go:225] [ 2519( 598): 2519( 598)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:37.763405 434971 task_exit.go:204] [ 2523( 10): 2523( 10)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.763442 434971 task_exit.go:204] [ 2523( 10): 2523( 10)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.763492 434971 task_signals.go:204] [ 2523( 10): 2526( 11)] Signal 9, PID: 2523, TID: 2526, fault addr: 0x0: terminating thread group D0318 17:09:37.763515 434971 task_exit.go:204] [ 2523( 10): 2526( 11)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.763931 434971 task_exit.go:204] [ 2523( 10): 2526( 11)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.763962 434971 task_exit.go:204] [ 2523( 10): 2526( 11)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.763974 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.764113 434971 task_exit.go:204] [ 2519( 598): 2519( 598)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.764153 434971 task_exit.go:204] [ 2519( 598): 2519( 598)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.764169 434971 task_signals.go:204] [ 2519( 598): 2525( 599)] Signal 9, PID: 2519, TID: 2525, fault addr: 0x0: terminating thread group D0318 17:09:37.764188 434971 task_exit.go:204] [ 2519( 598): 2525( 599)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.764527 434971 task_exit.go:204] [ 2519( 598): 2525( 599)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.764552 434971 task_exit.go:204] [ 2519( 598): 2525( 599)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.764569 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:37.764626 434971 task_exit.go:204] [ 2519( 598): 2519( 598)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.764897 434971 task_exit.go:204] [ 2523( 10): 2523( 10)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:37 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x371200, 0x0) 17:09:37 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semget$private(0x0, 0x5, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000040)=""/169) D0318 17:09:37.774528 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:37.774567 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 36 D0318 17:09:37.774664 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:37.775147 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:37.775179 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 37 D0318 17:09:37.775190 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:37.777850 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:37.777896 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 36 D0318 17:09:37.778002 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:37.778964 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:37.778993 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 37 D0318 17:09:37.779004 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:37.779470 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:37.779497 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 38 D0318 17:09:37.779509 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:37.781547 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:37.781571 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 39 D0318 17:09:37.781579 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:37.781896 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:37.781932 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 40 D0318 17:09:37.781947 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:37.781961 434971 usertrap_amd64.go:212] [ 2528( 62): 2529( 63)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:37.781978 434971 usertrap_amd64.go:122] [ 2528( 62): 2529( 63)] Allocate a new trap: 0xc001195170 41 D0318 17:09:37.781989 434971 usertrap_amd64.go:225] [ 2528( 62): 2529( 63)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:37.782234 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:37.782260 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 38 D0318 17:09:37.782271 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:37.782437 434971 usertrap_amd64.go:212] [ 2528( 62): 2528( 62)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:37.782470 434971 usertrap_amd64.go:122] [ 2528( 62): 2528( 62)] Allocate a new trap: 0xc001195170 42 D0318 17:09:37.782481 434971 usertrap_amd64.go:225] [ 2528( 62): 2528( 62)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:37.783488 434971 task_exit.go:204] [ 2528( 62): 2528( 62)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.783536 434971 task_exit.go:204] [ 2528( 62): 2528( 62)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.783565 434971 task_signals.go:204] [ 2528( 62): 2529( 63)] Signal 9, PID: 2528, TID: 2529, fault addr: 0x0: terminating thread group D0318 17:09:37.783586 434971 task_exit.go:204] [ 2528( 62): 2529( 63)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.783876 434971 task_exit.go:204] [ 2528( 62): 2529( 63)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.783903 434971 task_exit.go:204] [ 2528( 62): 2529( 63)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.783915 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:37.784248 434971 task_exit.go:204] [ 2528( 62): 2528( 62)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.785259 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:37.785415 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 39 D0318 17:09:37.785444 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:37.785679 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:37.785694 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 40 D0318 17:09:37.785703 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:37.786007 434971 usertrap_amd64.go:212] [ 2527( 12): 2530( 13)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:37.786033 434971 usertrap_amd64.go:122] [ 2527( 12): 2530( 13)] Allocate a new trap: 0xc001405da0 41 D0318 17:09:37.786043 434971 usertrap_amd64.go:225] [ 2527( 12): 2530( 13)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:37.786445 434971 usertrap_amd64.go:212] [ 2527( 12): 2527( 12)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:37.786475 434971 usertrap_amd64.go:122] [ 2527( 12): 2527( 12)] Allocate a new trap: 0xc001405da0 42 D0318 17:09:37.786486 434971 usertrap_amd64.go:225] [ 2527( 12): 2527( 12)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:37.787042 434971 task_exit.go:204] [ 2527( 12): 2527( 12)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.787081 434971 task_exit.go:204] [ 2527( 12): 2527( 12)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.787102 434971 task_signals.go:204] [ 2527( 12): 2530( 13)] Signal 9, PID: 2527, TID: 2530, fault addr: 0x0: terminating thread group D0318 17:09:37.787114 434971 task_exit.go:204] [ 2527( 12): 2530( 13)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:37.787415 434971 task_exit.go:204] [ 2527( 12): 2530( 13)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:37.787446 434971 task_exit.go:204] [ 2527( 12): 2530( 13)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:37.787457 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:37.788531 434971 task_exit.go:204] [ 2527( 12): 2527( 12)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.285508 434971 usertrap_amd64.go:212] [ 2464( 679): 2464( 679)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.285593 434971 usertrap_amd64.go:122] [ 2464( 679): 2464( 679)] Allocate a new trap: 0xc0013bb9e0 44 D0318 17:09:38.285615 434971 usertrap_amd64.go:225] [ 2464( 679): 2464( 679)] Apply the binary patch addr 555843dffc93 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0318 17:09:38.286953 434971 task_exit.go:204] [ 2464( 679): 2464( 679)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.287076 434971 task_exit.go:204] [ 2464( 679): 2464( 679)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.287131 434971 task_signals.go:204] [ 2464( 679): 2467( 680)] Signal 9, PID: 2464, TID: 2467, fault addr: 0x0: terminating thread group D0318 17:09:38.287173 434971 task_exit.go:204] [ 2464( 679): 2467( 680)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.287764 434971 task_exit.go:204] [ 2464( 679): 2467( 680)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.287808 434971 task_exit.go:204] [ 2464( 679): 2467( 680)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.287824 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.288741 434971 task_exit.go:204] [ 2464( 679): 2464( 679)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000003b80)) 17:09:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) 17:09:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) write$tun(r0, 0x0, 0x0) 17:09:38 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/power_supply', 0x0, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') dup3(r1, r0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) D0318 17:09:38.299468 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.299658 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 36 D0318 17:09:38.299950 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.301787 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.301844 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 37 D0318 17:09:38.301863 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.302706 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:38.302746 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 37 D0318 17:09:38.302861 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:38.302991 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.303027 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 36 D0318 17:09:38.303251 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.304593 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.304647 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 37 D0318 17:09:38.304924 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.306358 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.306399 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 38 D0318 17:09:38.306413 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.308043 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.308082 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 38 D0318 17:09:38.308099 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.311385 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.311421 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 39 D0318 17:09:38.311436 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.312340 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:38.312446 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 38 D0318 17:09:38.312529 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:38.315657 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.315710 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 39 D0318 17:09:38.315731 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.315955 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.315985 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 40 D0318 17:09:38.316001 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.316149 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.316171 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 40 D0318 17:09:38.316185 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.316390 434971 usertrap_amd64.go:212] [ 2531( 14): 2535( 15)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.316551 434971 usertrap_amd64.go:122] [ 2531( 14): 2535( 15)] Allocate a new trap: 0xc0084c2e70 41 D0318 17:09:38.316663 434971 usertrap_amd64.go:225] [ 2531( 14): 2535( 15)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.316684 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.316783 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 41 D0318 17:09:38.317020 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.317124 434971 usertrap_amd64.go:212] [ 2534( 681): 2536( 682)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.317198 434971 usertrap_amd64.go:122] [ 2534( 681): 2536( 682)] Allocate a new trap: 0xc0080588d0 42 D0318 17:09:38.317258 434971 usertrap_amd64.go:225] [ 2534( 681): 2536( 682)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.317573 434971 usertrap_amd64.go:212] [ 2531( 14): 2535( 15)] Found the pattern at ip 5559c9ffb999:sysno 257 D0318 17:09:38.317619 434971 usertrap_amd64.go:122] [ 2531( 14): 2535( 15)] Allocate a new trap: 0xc0084c2e70 42 D0318 17:09:38.317638 434971 usertrap_amd64.go:225] [ 2531( 14): 2535( 15)] Apply the binary patch addr 5559c9ffb999 trap addr 66d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.318660 434971 usertrap_amd64.go:212] [ 2534( 681): 2534( 681)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.318720 434971 usertrap_amd64.go:122] [ 2534( 681): 2534( 681)] Allocate a new trap: 0xc0080588d0 43 D0318 17:09:38.318735 434971 usertrap_amd64.go:225] [ 2534( 681): 2534( 681)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.319499 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:38.319522 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 39 D0318 17:09:38.319536 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:38.319996 434971 task_exit.go:204] [ 2534( 681): 2534( 681)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.320072 434971 task_exit.go:204] [ 2534( 681): 2534( 681)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.320126 434971 task_signals.go:204] [ 2534( 681): 2536( 682)] Signal 9, PID: 2534, TID: 2536, fault addr: 0x0: terminating thread group D0318 17:09:38.320193 434971 task_exit.go:204] [ 2534( 681): 2536( 682)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.320343 434971 usertrap_amd64.go:212] [ 2531( 14): 2531( 14)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.320408 434971 usertrap_amd64.go:122] [ 2531( 14): 2531( 14)] Allocate a new trap: 0xc0084c2e70 43 D0318 17:09:38.320432 434971 usertrap_amd64.go:225] [ 2531( 14): 2531( 14)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 17:09:38.320738 434971 task_exit.go:204] [ 2534( 681): 2536( 682)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.320780 434971 task_exit.go:204] [ 2534( 681): 2536( 682)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.320795 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.321766 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.321787 434971 task_exit.go:204] [ 2531( 14): 2531( 14)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.321843 434971 task_signals.go:204] [ 2531( 14): 2535( 15)] Signal 9, PID: 2531, TID: 2535, fault addr: 0x0: terminating thread group D0318 17:09:38.321797 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 37 D0318 17:09:38.321862 434971 task_exit.go:204] [ 2531( 14): 2531( 14)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.321877 434971 task_exit.go:204] [ 2531( 14): 2535( 15)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.321875 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.322393 434971 task_exit.go:204] [ 2531( 14): 2535( 15)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.322568 434971 task_exit.go:204] [ 2531( 14): 2535( 15)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.322600 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.322627 434971 task_exit.go:204] [ 2534( 681): 2534( 681)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.322772 434971 task_exit.go:204] [ 2531( 14): 2531( 14)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual', 0x200140, 0x35) 17:09:38 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RATTACH(r1, 0x0, 0x0) D0318 17:09:38.325308 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:38.325341 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 40 D0318 17:09:38.325354 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:38.325761 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:38.325785 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 41 D0318 17:09:38.325803 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:38.325928 434971 usertrap_amd64.go:212] [ 2533( 600): 2537( 601)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:38.325962 434971 usertrap_amd64.go:122] [ 2533( 600): 2537( 601)] Allocate a new trap: 0xc001405e00 42 D0318 17:09:38.325977 434971 usertrap_amd64.go:225] [ 2533( 600): 2537( 601)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:38.327307 434971 usertrap_amd64.go:212] [ 2533( 600): 2533( 600)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:38.327346 434971 usertrap_amd64.go:122] [ 2533( 600): 2533( 600)] Allocate a new trap: 0xc001405e00 43 D0318 17:09:38.327361 434971 usertrap_amd64.go:225] [ 2533( 600): 2533( 600)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:38.328826 434971 task_exit.go:204] [ 2533( 600): 2533( 600)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.328886 434971 task_exit.go:204] [ 2533( 600): 2533( 600)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.328949 434971 task_signals.go:204] [ 2533( 600): 2537( 601)] Signal 9, PID: 2533, TID: 2537, fault addr: 0x0: terminating thread group D0318 17:09:38.328986 434971 task_exit.go:204] [ 2533( 600): 2537( 601)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.329773 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.329811 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 38 D0318 17:09:38.329834 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.330761 434971 task_exit.go:204] [ 2533( 600): 2537( 601)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.330798 434971 task_exit.go:204] [ 2533( 600): 2537( 601)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.330812 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:38.331888 434971 task_exit.go:204] [ 2533( 600): 2533( 600)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) D0318 17:09:38.334028 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.334126 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 39 D0318 17:09:38.334219 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.334626 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.334652 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 40 D0318 17:09:38.334664 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.334754 434971 usertrap_amd64.go:212] [ 2532( 64): 2539( 65)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.334792 434971 usertrap_amd64.go:122] [ 2532( 64): 2539( 65)] Allocate a new trap: 0xc000b1cde0 41 D0318 17:09:38.334810 434971 usertrap_amd64.go:225] [ 2532( 64): 2539( 65)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.336163 434971 usertrap_amd64.go:212] [ 2532( 64): 2532( 64)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.336202 434971 usertrap_amd64.go:122] [ 2532( 64): 2532( 64)] Allocate a new trap: 0xc000b1cde0 42 D0318 17:09:38.336218 434971 usertrap_amd64.go:225] [ 2532( 64): 2532( 64)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.340921 434971 task_exit.go:204] [ 2532( 64): 2532( 64)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.340972 434971 task_signals.go:204] [ 2532( 64): 2539( 65)] Signal 9, PID: 2532, TID: 2539, fault addr: 0x0: terminating thread group D0318 17:09:38.341003 434971 task_exit.go:204] [ 2532( 64): 2539( 65)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.341036 434971 task_exit.go:204] [ 2532( 64): 2539( 65)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.341045 434971 task_exit.go:204] [ 2532( 64): 2539( 65)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.341391 434971 task_exit.go:204] [ 2532( 64): 2532( 64)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.341481 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.343156 434971 task_exit.go:204] [ 2532( 64): 2532( 64)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x308c418, 0x0) D0318 17:09:38.349441 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.349571 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 36 D0318 17:09:38.349707 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.351072 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.351109 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 37 D0318 17:09:38.351122 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.353627 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.353659 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 37 D0318 17:09:38.353851 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.355825 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.355851 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 38 D0318 17:09:38.355867 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.356145 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.356179 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 38 D0318 17:09:38.356190 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.357960 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:38.358019 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 37 D0318 17:09:38.358249 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:38.360407 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:38.360473 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 38 D0318 17:09:38.360505 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:38.360592 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.360624 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 39 D0318 17:09:38.360637 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.361187 434971 usertrap_amd64.go:212] [ 2541( 16): 2542( 17)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.361251 434971 usertrap_amd64.go:122] [ 2541( 16): 2542( 17)] Allocate a new trap: 0xc001405e90 40 D0318 17:09:38.361271 434971 usertrap_amd64.go:225] [ 2541( 16): 2542( 17)] Apply the binary patch addr 5559c9fd1320 trap addr 66c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.361323 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.361346 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 41 D0318 17:09:38.361357 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559c9fd1c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.362677 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.362718 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 39 D0318 17:09:38.362735 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.363235 434971 usertrap_amd64.go:212] [ 2541( 16): 2541( 16)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.363363 434971 usertrap_amd64.go:122] [ 2541( 16): 2541( 16)] Allocate a new trap: 0xc001405e90 42 D0318 17:09:38.363398 434971 usertrap_amd64.go:225] [ 2541( 16): 2541( 16)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.365763 434971 task_exit.go:204] [ 2541( 16): 2541( 16)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.365835 434971 task_exit.go:204] [ 2541( 16): 2541( 16)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.365871 434971 task_signals.go:204] [ 2541( 16): 2542( 17)] Signal 9, PID: 2541, TID: 2542, fault addr: 0x0: terminating thread group D0318 17:09:38.365888 434971 task_exit.go:204] [ 2541( 16): 2542( 17)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.366410 434971 task_exit.go:204] [ 2541( 16): 2542( 17)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.366456 434971 task_exit.go:204] [ 2541( 16): 2542( 17)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.366474 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.367346 434971 task_exit.go:204] [ 2541( 16): 2541( 16)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: pipe2$9p(&(0x7f0000000000), 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) write$tun(r0, 0x0, 0x0) D0318 17:09:38.371780 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:38.371944 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 39 D0318 17:09:38.371979 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:38.374780 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.374830 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 36 D0318 17:09:38.374938 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.378866 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.378957 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 37 D0318 17:09:38.379071 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.379095 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 40 D0318 17:09:38.379112 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.379063 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.379522 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.379539 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 41 D0318 17:09:38.379549 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.379838 434971 usertrap_amd64.go:212] [ 2538( 683): 2545( 684)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.381066 434971 usertrap_amd64.go:122] [ 2538( 683): 2545( 684)] Allocate a new trap: 0xc000d15860 42 D0318 17:09:38.381102 434971 usertrap_amd64.go:225] [ 2538( 683): 2545( 684)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.381196 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.381223 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 36 D0318 17:09:38.381296 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.382251 434971 usertrap_amd64.go:212] [ 2538( 683): 2538( 683)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.382267 434971 usertrap_amd64.go:122] [ 2538( 683): 2538( 683)] Allocate a new trap: 0xc000d15860 43 D0318 17:09:38.382281 434971 usertrap_amd64.go:225] [ 2538( 683): 2538( 683)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.382983 434971 task_exit.go:204] [ 2538( 683): 2538( 683)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.383027 434971 task_exit.go:204] [ 2538( 683): 2538( 683)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.383051 434971 task_signals.go:204] [ 2538( 683): 2545( 684)] Signal 9, PID: 2538, TID: 2545, fault addr: 0x0: terminating thread group D0318 17:09:38.383067 434971 task_exit.go:204] [ 2538( 683): 2545( 684)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.384157 434971 task_exit.go:204] [ 2538( 683): 2545( 684)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.384174 434971 task_exit.go:204] [ 2538( 683): 2545( 684)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.384189 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.384256 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.384313 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 37 D0318 17:09:38.384329 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.384691 434971 task_exit.go:204] [ 2538( 683): 2538( 683)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x129042, 0x0) D0318 17:09:38.389105 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.389157 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 38 D0318 17:09:38.389175 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.390541 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:38.390570 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 40 D0318 17:09:38.390587 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:38.391077 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:38.391170 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 41 D0318 17:09:38.391354 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:38.391477 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.391493 434971 usertrap_amd64.go:212] [ 2540( 602): 2547( 603)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:38.391506 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 38 D0318 17:09:38.391512 434971 usertrap_amd64.go:122] [ 2540( 602): 2547( 603)] Allocate a new trap: 0xc000b1ce40 42 D0318 17:09:38.391518 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.391522 434971 usertrap_amd64.go:225] [ 2540( 602): 2547( 603)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:38.393475 434971 usertrap_amd64.go:212] [ 2540( 602): 2547( 603)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:38.393545 434971 usertrap_amd64.go:122] [ 2540( 602): 2547( 603)] Allocate a new trap: 0xc000b1ce40 43 D0318 17:09:38.393564 434971 usertrap_amd64.go:225] [ 2540( 602): 2547( 603)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:38.394181 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.394219 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 39 D0318 17:09:38.394235 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.394701 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.394766 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 40 D0318 17:09:38.394810 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.394844 434971 usertrap_amd64.go:212] [ 2544( 18): 2548( 19)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.394867 434971 usertrap_amd64.go:122] [ 2544( 18): 2548( 19)] Allocate a new trap: 0xc000d15890 41 D0318 17:09:38.394880 434971 usertrap_amd64.go:225] [ 2544( 18): 2548( 19)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.396329 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.396373 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 39 D0318 17:09:38.396386 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.396430 434971 usertrap_amd64.go:212] [ 2544( 18): 2544( 18)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.396446 434971 usertrap_amd64.go:122] [ 2544( 18): 2544( 18)] Allocate a new trap: 0xc000d15890 42 D0318 17:09:38.396457 434971 usertrap_amd64.go:225] [ 2544( 18): 2544( 18)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.396670 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.396700 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 40 D0318 17:09:38.396710 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.396796 434971 usertrap_amd64.go:212] [ 2543( 66): 2549( 67)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.396808 434971 usertrap_amd64.go:122] [ 2543( 66): 2549( 67)] Allocate a new trap: 0xc0084c2ed0 41 D0318 17:09:38.396815 434971 usertrap_amd64.go:225] [ 2543( 66): 2549( 67)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.397335 434971 usertrap_amd64.go:212] [ 2543( 66): 2543( 66)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.397371 434971 usertrap_amd64.go:122] [ 2543( 66): 2543( 66)] Allocate a new trap: 0xc0084c2ed0 42 D0318 17:09:38.397385 434971 usertrap_amd64.go:225] [ 2543( 66): 2543( 66)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.398013 434971 task_exit.go:204] [ 2544( 18): 2544( 18)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.398085 434971 task_exit.go:204] [ 2544( 18): 2544( 18)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.398113 434971 task_signals.go:204] [ 2544( 18): 2548( 19)] Signal 9, PID: 2544, TID: 2548, fault addr: 0x0: terminating thread group D0318 17:09:38.398128 434971 task_exit.go:204] [ 2544( 18): 2548( 19)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.398296 434971 usertrap_amd64.go:212] [ 2540( 602): 2540( 602)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:38.398334 434971 usertrap_amd64.go:122] [ 2540( 602): 2540( 602)] Allocate a new trap: 0xc000b1ce40 44 D0318 17:09:38.398351 434971 usertrap_amd64.go:225] [ 2540( 602): 2540( 602)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:38.398510 434971 task_exit.go:204] [ 2544( 18): 2548( 19)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.398541 434971 task_exit.go:204] [ 2544( 18): 2548( 19)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.398555 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.398580 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.398618 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 37 D0318 17:09:38.398791 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.398923 434971 task_exit.go:204] [ 2544( 18): 2544( 18)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.399227 434971 task_exit.go:204] [ 2543( 66): 2543( 66)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.399335 434971 task_exit.go:204] [ 2543( 66): 2543( 66)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.399429 434971 task_signals.go:204] [ 2543( 66): 2549( 67)] Signal 9, PID: 2543, TID: 2549, fault addr: 0x0: terminating thread group D0318 17:09:38.399470 434971 task_exit.go:204] [ 2543( 66): 2549( 67)] Transitioning from exit state TaskExitNone to TaskExitInitiated 17:09:38 executing program 1: r0 = msgget(0x0, 0x0) msgsnd(r0, &(0x7f0000001300)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f00000013c0)={0x0, ""/213}, 0xdd, 0x3, 0x1800) D0318 17:09:38.400147 434971 task_exit.go:204] [ 2543( 66): 2549( 67)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.400197 434971 task_exit.go:204] [ 2543( 66): 2549( 67)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.400212 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.400253 434971 task_exit.go:204] [ 2540( 602): 2540( 602)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.400254 434971 task_signals.go:204] [ 2540( 602): 2547( 603)] Signal 9, PID: 2540, TID: 2547, fault addr: 0x0: terminating thread group D0318 17:09:38.400275 434971 task_exit.go:204] [ 2540( 602): 2540( 602)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.400300 434971 task_exit.go:204] [ 2543( 66): 2543( 66)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.400351 434971 task_exit.go:204] [ 2540( 602): 2547( 603)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.400827 434971 task_exit.go:204] [ 2540( 602): 2547( 603)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.400846 434971 task_exit.go:204] [ 2540( 602): 2547( 603)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.400857 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:38.401487 434971 task_exit.go:204] [ 2540( 602): 2540( 602)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.401561 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.401579 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 38 D0318 17:09:38.401591 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) write$tun(r0, 0x0, 0x0) 17:09:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) read$watch_queue(r1, &(0x7f0000000000)=""/8, 0x8) D0318 17:09:38.409221 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.409287 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 36 D0318 17:09:38.409408 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.412793 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.412905 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 37 D0318 17:09:38.412943 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.415430 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:38.415469 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 37 D0318 17:09:38.415676 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:38.417384 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.417427 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 36 D0318 17:09:38.417478 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.417701 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 39 D0318 17:09:38.417784 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.417544 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.419109 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:38.419148 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 38 D0318 17:09:38.419165 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:38.421630 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.421682 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 37 D0318 17:09:38.421697 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.422178 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.422236 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 40 D0318 17:09:38.422330 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.422716 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.422852 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 41 D0318 17:09:38.422917 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.423139 434971 usertrap_amd64.go:212] [ 2546( 685): 2553( 686)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.423190 434971 usertrap_amd64.go:122] [ 2546( 685): 2553( 686)] Allocate a new trap: 0xc000d158c0 42 D0318 17:09:38.423211 434971 usertrap_amd64.go:225] [ 2546( 685): 2553( 686)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.423848 434971 usertrap_amd64.go:212] [ 2546( 685): 2546( 685)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.423965 434971 usertrap_amd64.go:122] [ 2546( 685): 2546( 685)] Allocate a new trap: 0xc000d158c0 43 D0318 17:09:38.424049 434971 usertrap_amd64.go:225] [ 2546( 685): 2546( 685)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.424920 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.425198 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 38 D0318 17:09:38.425266 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.424993 434971 task_exit.go:204] [ 2546( 685): 2546( 685)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.425423 434971 task_signals.go:204] [ 2546( 685): 2553( 686)] Signal 9, PID: 2546, TID: 2553, fault addr: 0x0: terminating thread group D0318 17:09:38.425467 434971 task_exit.go:204] [ 2546( 685): 2546( 685)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.425846 434971 task_exit.go:204] [ 2546( 685): 2553( 686)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.426364 434971 task_exit.go:204] [ 2546( 685): 2553( 686)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.426404 434971 task_exit.go:204] [ 2546( 685): 2553( 686)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.426419 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.426754 434971 task_exit.go:204] [ 2546( 685): 2546( 685)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.429391 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:38.429474 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 39 D0318 17:09:38.429575 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) 17:09:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) D0318 17:09:38.433889 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:38.433928 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 40 D0318 17:09:38.433942 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:38.434167 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:38.434242 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 41 D0318 17:09:38.434319 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:38.434426 434971 usertrap_amd64.go:212] [ 2552( 604): 2554( 605)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:38.434462 434971 usertrap_amd64.go:122] [ 2552( 604): 2554( 605)] Allocate a new trap: 0xc001195230 42 D0318 17:09:38.434477 434971 usertrap_amd64.go:225] [ 2552( 604): 2554( 605)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:38.434873 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.434900 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 38 D0318 17:09:38.434911 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.436161 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.436215 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 39 D0318 17:09:38.436235 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.436765 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.436795 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 40 D0318 17:09:38.436810 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.437114 434971 usertrap_amd64.go:212] [ 2550( 20): 2555( 21)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.437205 434971 usertrap_amd64.go:122] [ 2550( 20): 2555( 21)] Allocate a new trap: 0xc000b1cea0 41 D0318 17:09:38.437240 434971 usertrap_amd64.go:225] [ 2550( 20): 2555( 21)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.438599 434971 usertrap_amd64.go:212] [ 2550( 20): 2550( 20)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.438719 434971 usertrap_amd64.go:122] [ 2550( 20): 2550( 20)] Allocate a new trap: 0xc000b1cea0 42 D0318 17:09:38.438757 434971 usertrap_amd64.go:225] [ 2550( 20): 2550( 20)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.440460 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.440491 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 39 D0318 17:09:38.440508 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.440734 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.440779 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 40 D0318 17:09:38.440796 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.441044 434971 usertrap_amd64.go:212] [ 2551( 68): 2557( 69)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.441215 434971 usertrap_amd64.go:122] [ 2551( 68): 2557( 69)] Allocate a new trap: 0xc0084c2f00 41 D0318 17:09:38.441305 434971 usertrap_amd64.go:225] [ 2551( 68): 2557( 69)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.441884 434971 task_exit.go:204] [ 2550( 20): 2550( 20)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.441989 434971 task_signals.go:204] [ 2550( 20): 2555( 21)] Signal 9, PID: 2550, TID: 2555, fault addr: 0x0: terminating thread group D0318 17:09:38.442029 434971 task_exit.go:204] [ 2550( 20): 2550( 20)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.442076 434971 task_exit.go:204] [ 2550( 20): 2555( 21)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.442613 434971 usertrap_amd64.go:212] [ 2551( 68): 2551( 68)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.442659 434971 usertrap_amd64.go:122] [ 2551( 68): 2551( 68)] Allocate a new trap: 0xc0084c2f00 42 D0318 17:09:38.442673 434971 usertrap_amd64.go:225] [ 2551( 68): 2551( 68)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.443670 434971 task_signals.go:204] [ 2551( 68): 2557( 69)] Signal 9, PID: 2551, TID: 2557, fault addr: 0x0: terminating thread group D0318 17:09:38.443750 434971 task_exit.go:204] [ 2550( 20): 2555( 21)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.443881 434971 task_exit.go:204] [ 2550( 20): 2555( 21)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.443920 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.443996 434971 task_exit.go:204] [ 2551( 68): 2551( 68)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.444087 434971 task_exit.go:204] [ 2551( 68): 2551( 68)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.444141 434971 task_exit.go:204] [ 2551( 68): 2557( 69)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.444578 434971 task_exit.go:204] [ 2551( 68): 2557( 69)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.444614 434971 task_exit.go:204] [ 2551( 68): 2557( 69)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.444628 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.445039 434971 task_exit.go:204] [ 2550( 20): 2550( 20)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.445507 434971 task_exit.go:204] [ 2551( 68): 2551( 68)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = msgget(0x0, 0x0) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/76}, 0x54, 0x2, 0x1000) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) 17:09:38 executing program 0: r0 = memfd_create(&(0x7f0000000000)='*\x00', 0x0) r1 = dup2(r0, r0) fsync(r1) D0318 17:09:38.453844 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.453890 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 37 D0318 17:09:38.454185 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.455856 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.455898 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 38 D0318 17:09:38.455915 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.461311 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.461368 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 39 D0318 17:09:38.461391 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.465144 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.465194 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 36 D0318 17:09:38.465315 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.465518 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.465565 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 36 D0318 17:09:38.465633 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.465652 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 40 D0318 17:09:38.465665 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.465694 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.465827 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.465849 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 41 D0318 17:09:38.465860 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.466182 434971 usertrap_amd64.go:212] [ 2556( 687): 2560( 688)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.466227 434971 usertrap_amd64.go:122] [ 2556( 687): 2560( 688)] Allocate a new trap: 0xc001405ec0 42 D0318 17:09:38.466248 434971 usertrap_amd64.go:225] [ 2556( 687): 2560( 688)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.467100 434971 usertrap_amd64.go:212] [ 2556( 687): 2556( 687)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.467132 434971 usertrap_amd64.go:122] [ 2556( 687): 2556( 687)] Allocate a new trap: 0xc001405ec0 43 D0318 17:09:38.467143 434971 usertrap_amd64.go:225] [ 2556( 687): 2556( 687)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.467693 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.467733 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 37 D0318 17:09:38.467744 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.468514 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.468606 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 37 D0318 17:09:38.468630 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.469937 434971 task_exit.go:204] [ 2556( 687): 2556( 687)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.470013 434971 task_exit.go:204] [ 2556( 687): 2556( 687)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.470076 434971 task_signals.go:204] [ 2556( 687): 2560( 688)] Signal 9, PID: 2556, TID: 2560, fault addr: 0x0: terminating thread group D0318 17:09:38.470095 434971 task_exit.go:204] [ 2556( 687): 2560( 688)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.470586 434971 task_exit.go:204] [ 2556( 687): 2560( 688)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.470622 434971 task_exit.go:204] [ 2556( 687): 2560( 688)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.470642 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.470963 434971 task_exit.go:204] [ 2556( 687): 2556( 687)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:38.473286 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.473321 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 38 D0318 17:09:38.473341 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.475170 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.475211 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 38 D0318 17:09:38.475232 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.476874 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.476909 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 39 D0318 17:09:38.476924 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.477264 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.477377 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 40 D0318 17:09:38.477458 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.479222 434971 usertrap_amd64.go:212] [ 2559( 22): 2561( 23)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.479304 434971 usertrap_amd64.go:122] [ 2559( 22): 2561( 23)] Allocate a new trap: 0xc001405f20 41 D0318 17:09:38.479381 434971 usertrap_amd64.go:225] [ 2559( 22): 2561( 23)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.481599 434971 usertrap_amd64.go:212] [ 2559( 22): 2559( 22)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.481683 434971 usertrap_amd64.go:122] [ 2559( 22): 2559( 22)] Allocate a new trap: 0xc001405f20 42 D0318 17:09:38.481721 434971 usertrap_amd64.go:225] [ 2559( 22): 2559( 22)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.482722 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.482871 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 39 D0318 17:09:38.482949 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.483274 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.483317 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 40 D0318 17:09:38.483333 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.483531 434971 usertrap_amd64.go:212] [ 2558( 70): 2563( 71)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.483570 434971 usertrap_amd64.go:122] [ 2558( 70): 2563( 71)] Allocate a new trap: 0xc001405ef0 41 D0318 17:09:38.483583 434971 usertrap_amd64.go:225] [ 2558( 70): 2563( 71)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.484443 434971 task_exit.go:204] [ 2559( 22): 2559( 22)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.484516 434971 task_exit.go:204] [ 2559( 22): 2559( 22)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.484529 434971 usertrap_amd64.go:212] [ 2558( 70): 2558( 70)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.484544 434971 usertrap_amd64.go:122] [ 2558( 70): 2558( 70)] Allocate a new trap: 0xc001405ef0 42 D0318 17:09:38.484555 434971 usertrap_amd64.go:225] [ 2558( 70): 2558( 70)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.484552 434971 task_signals.go:204] [ 2559( 22): 2561( 23)] Signal 9, PID: 2559, TID: 2561, fault addr: 0x0: terminating thread group D0318 17:09:38.484666 434971 task_exit.go:204] [ 2559( 22): 2561( 23)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.485091 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.485245 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 37 D0318 17:09:38.485368 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.485458 434971 task_exit.go:204] [ 2559( 22): 2561( 23)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.485491 434971 task_exit.go:204] [ 2559( 22): 2561( 23)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.485519 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.485811 434971 task_exit.go:204] [ 2559( 22): 2559( 22)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x10000009) D0318 17:09:38.487201 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedfdd1ae:sysno 230 D0318 17:09:38.487332 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 43 D0318 17:09:38.487352 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedfdd1ae trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:38.488375 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.488406 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 38 D0318 17:09:38.488419 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.492250 434971 task_exit.go:204] [ 2558( 70): 2558( 70)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.492313 434971 task_exit.go:204] [ 2558( 70): 2558( 70)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.492349 434971 task_signals.go:204] [ 2558( 70): 2563( 71)] Signal 9, PID: 2558, TID: 2563, fault addr: 0x0: terminating thread group D0318 17:09:38.492370 434971 task_exit.go:204] [ 2558( 70): 2563( 71)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.494123 434971 task_exit.go:204] [ 2558( 70): 2563( 71)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.494158 434971 task_exit.go:204] [ 2558( 70): 2563( 71)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.494171 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.494338 434971 task_exit.go:204] [ 2558( 70): 2558( 70)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x11b) D0318 17:09:38.498832 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.498885 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 39 D0318 17:09:38.498898 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.501752 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.501810 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 40 D0318 17:09:38.501828 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.502301 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.502338 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 41 D0318 17:09:38.502354 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.502659 434971 usertrap_amd64.go:212] [ 2562( 689): 2565( 690)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.502692 434971 usertrap_amd64.go:122] [ 2562( 689): 2565( 690)] Allocate a new trap: 0xc0084c2f60 42 D0318 17:09:38.502703 434971 usertrap_amd64.go:225] [ 2562( 689): 2565( 690)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.507059 434971 usertrap_amd64.go:212] [ 2562( 689): 2562( 689)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.507129 434971 usertrap_amd64.go:122] [ 2562( 689): 2562( 689)] Allocate a new trap: 0xc0084c2f60 43 D0318 17:09:38.507156 434971 usertrap_amd64.go:225] [ 2562( 689): 2562( 689)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.507845 434971 task_exit.go:204] [ 2562( 689): 2562( 689)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.508110 434971 task_exit.go:204] [ 2562( 689): 2562( 689)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.508114 434971 task_signals.go:204] [ 2562( 689): 2565( 690)] Signal 9, PID: 2562, TID: 2565, fault addr: 0x0: terminating thread group D0318 17:09:38.508188 434971 task_exit.go:204] [ 2562( 689): 2565( 690)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.508607 434971 task_exit.go:204] [ 2562( 689): 2565( 690)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.508647 434971 task_exit.go:204] [ 2562( 689): 2565( 690)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.508677 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.509792 434971 task_exit.go:204] [ 2562( 689): 2562( 689)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0xea60}) D0318 17:09:38.513769 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.513813 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 36 D0318 17:09:38.513934 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.515747 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.515812 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 37 D0318 17:09:38.515835 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.520154 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.520197 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 36 D0318 17:09:38.520613 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.521750 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.521780 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 37 D0318 17:09:38.521926 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.523084 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.523116 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 38 D0318 17:09:38.523128 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.523218 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.523244 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 37 D0318 17:09:38.523254 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.523879 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.523908 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 38 D0318 17:09:38.523920 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.529222 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.529256 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 38 D0318 17:09:38.529273 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.529572 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.529603 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 39 D0318 17:09:38.529625 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.529655 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.529849 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 39 D0318 17:09:38.529865 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.530112 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.530209 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 40 D0318 17:09:38.530247 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.530325 434971 usertrap_amd64.go:212] [ 2564( 24): 2568( 25)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.530345 434971 usertrap_amd64.go:122] [ 2564( 24): 2568( 25)] Allocate a new trap: 0xc001195260 41 D0318 17:09:38.530356 434971 usertrap_amd64.go:225] [ 2564( 24): 2568( 25)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.531205 434971 usertrap_amd64.go:212] [ 2564( 24): 2564( 24)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.531233 434971 usertrap_amd64.go:122] [ 2564( 24): 2564( 24)] Allocate a new trap: 0xc001195260 42 D0318 17:09:38.531244 434971 usertrap_amd64.go:225] [ 2564( 24): 2564( 24)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.532676 434971 task_exit.go:204] [ 2564( 24): 2564( 24)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.532730 434971 task_exit.go:204] [ 2564( 24): 2564( 24)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.532753 434971 task_signals.go:204] [ 2564( 24): 2568( 25)] Signal 9, PID: 2564, TID: 2568, fault addr: 0x0: terminating thread group D0318 17:09:38.532782 434971 task_exit.go:204] [ 2564( 24): 2568( 25)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.533186 434971 task_exit.go:204] [ 2564( 24): 2568( 25)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.533313 434971 task_exit.go:204] [ 2564( 24): 2568( 25)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.533342 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.533813 434971 task_exit.go:204] [ 2564( 24): 2564( 24)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.534115 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.534142 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 40 D0318 17:09:38.534153 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) 17:09:38 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:38.534280 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.534313 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 41 D0318 17:09:38.534418 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.535166 434971 usertrap_amd64.go:212] [ 2567( 691): 2569( 692)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.535181 434971 usertrap_amd64.go:122] [ 2567( 691): 2569( 692)] Allocate a new trap: 0xc0080589c0 42 D0318 17:09:38.535191 434971 usertrap_amd64.go:225] [ 2567( 691): 2569( 692)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.535574 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.535635 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 39 D0318 17:09:38.535647 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.535861 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.535893 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 40 D0318 17:09:38.535907 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.536190 434971 usertrap_amd64.go:212] [ 2566( 72): 2570( 73)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.536288 434971 usertrap_amd64.go:122] [ 2566( 72): 2570( 73)] Allocate a new trap: 0xc008058990 41 D0318 17:09:38.536361 434971 usertrap_amd64.go:225] [ 2566( 72): 2570( 73)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.537266 434971 usertrap_amd64.go:212] [ 2566( 72): 2566( 72)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.537296 434971 usertrap_amd64.go:122] [ 2566( 72): 2566( 72)] Allocate a new trap: 0xc008058990 42 D0318 17:09:38.537306 434971 usertrap_amd64.go:225] [ 2566( 72): 2566( 72)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.539452 434971 task_exit.go:204] [ 2566( 72): 2566( 72)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.539557 434971 task_signals.go:204] [ 2566( 72): 2570( 73)] Signal 9, PID: 2566, TID: 2570, fault addr: 0x0: terminating thread group D0318 17:09:38.539587 434971 task_exit.go:204] [ 2566( 72): 2566( 72)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.539598 434971 task_exit.go:204] [ 2566( 72): 2570( 73)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.540147 434971 task_exit.go:204] [ 2566( 72): 2570( 73)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.540174 434971 task_exit.go:204] [ 2566( 72): 2570( 73)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.540186 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.541268 434971 task_exit.go:204] [ 2566( 72): 2566( 72)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: r0 = timerfd_create(0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, 0x0) D0318 17:09:38.544026 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.544202 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 36 D0318 17:09:38.544359 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.546631 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.546656 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 37 D0318 17:09:38.546668 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.549700 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.549741 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 36 D0318 17:09:38.549905 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.551188 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.551220 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 37 D0318 17:09:38.551234 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.551667 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.551711 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 38 D0318 17:09:38.551731 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.554894 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.554928 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 39 D0318 17:09:38.554939 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.555252 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.555280 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 40 D0318 17:09:38.555290 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.555299 434971 usertrap_amd64.go:212] [ 2571( 26): 2573( 27)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.555304 434971 usertrap_amd64.go:122] [ 2571( 26): 2573( 27)] Allocate a new trap: 0xc0081618f0 41 D0318 17:09:38.555309 434971 usertrap_amd64.go:225] [ 2571( 26): 2573( 27)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.556473 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.556500 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 38 D0318 17:09:38.556510 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.557778 434971 usertrap_amd64.go:212] [ 2571( 26): 2571( 26)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.557808 434971 usertrap_amd64.go:122] [ 2571( 26): 2571( 26)] Allocate a new trap: 0xc0081618f0 42 D0318 17:09:38.557819 434971 usertrap_amd64.go:225] [ 2571( 26): 2571( 26)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.558719 434971 task_exit.go:204] [ 2571( 26): 2571( 26)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.558773 434971 task_exit.go:204] [ 2571( 26): 2571( 26)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.558803 434971 task_signals.go:204] [ 2571( 26): 2573( 27)] Signal 9, PID: 2571, TID: 2573, fault addr: 0x0: terminating thread group D0318 17:09:38.558962 434971 task_exit.go:204] [ 2571( 26): 2573( 27)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.559381 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.559419 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 39 D0318 17:09:38.559430 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.559552 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.559583 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 40 D0318 17:09:38.559591 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.559721 434971 task_exit.go:204] [ 2571( 26): 2573( 27)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.559761 434971 task_exit.go:204] [ 2571( 26): 2573( 27)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.559783 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.559848 434971 task_exit.go:204] [ 2571( 26): 2571( 26)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.559997 434971 usertrap_amd64.go:212] [ 2572( 74): 2574( 75)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.560212 434971 usertrap_amd64.go:122] [ 2572( 74): 2574( 75)] Allocate a new trap: 0xc0080589f0 41 D0318 17:09:38.560257 434971 usertrap_amd64.go:225] [ 2572( 74): 2574( 75)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) 17:09:38 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) D0318 17:09:38.560864 434971 usertrap_amd64.go:212] [ 2572( 74): 2572( 74)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.560900 434971 usertrap_amd64.go:122] [ 2572( 74): 2572( 74)] Allocate a new trap: 0xc0080589f0 42 D0318 17:09:38.560926 434971 usertrap_amd64.go:225] [ 2572( 74): 2572( 74)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.562707 434971 task_exit.go:204] [ 2572( 74): 2572( 74)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.562774 434971 task_signals.go:204] [ 2572( 74): 2574( 75)] Signal 9, PID: 2572, TID: 2574, fault addr: 0x0: terminating thread group D0318 17:09:38.562794 434971 task_exit.go:204] [ 2572( 74): 2572( 74)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.562807 434971 task_exit.go:204] [ 2572( 74): 2574( 75)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.563135 434971 task_exit.go:204] [ 2572( 74): 2574( 75)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.563183 434971 task_exit.go:204] [ 2572( 74): 2574( 75)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.563205 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.563911 434971 task_exit.go:204] [ 2572( 74): 2572( 74)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) write$tun(r1, 0x0, 0x0) D0318 17:09:38.568551 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.568587 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 36 D0318 17:09:38.568714 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.569563 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.569626 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 37 D0318 17:09:38.569655 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.574940 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.575083 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 38 D0318 17:09:38.575123 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.574981 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.575207 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 36 D0318 17:09:38.575495 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.578096 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.578152 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 39 D0318 17:09:38.578169 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.578600 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.578654 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 40 D0318 17:09:38.578669 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.578787 434971 usertrap_amd64.go:212] [ 2575( 28): 2577( 29)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.578823 434971 usertrap_amd64.go:122] [ 2575( 28): 2577( 29)] Allocate a new trap: 0xc000b1cf60 41 D0318 17:09:38.578837 434971 usertrap_amd64.go:225] [ 2575( 28): 2577( 29)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.580035 434971 usertrap_amd64.go:212] [ 2575( 28): 2575( 28)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.580062 434971 usertrap_amd64.go:122] [ 2575( 28): 2575( 28)] Allocate a new trap: 0xc000b1cf60 42 D0318 17:09:38.580072 434971 usertrap_amd64.go:225] [ 2575( 28): 2575( 28)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.580432 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.580458 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 37 D0318 17:09:38.580468 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.581168 434971 task_exit.go:204] [ 2575( 28): 2575( 28)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.581233 434971 task_exit.go:204] [ 2575( 28): 2575( 28)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.581268 434971 task_signals.go:204] [ 2575( 28): 2577( 29)] Signal 9, PID: 2575, TID: 2577, fault addr: 0x0: terminating thread group D0318 17:09:38.581323 434971 task_exit.go:204] [ 2575( 28): 2577( 29)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.581688 434971 task_exit.go:204] [ 2575( 28): 2577( 29)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.581726 434971 task_exit.go:204] [ 2575( 28): 2577( 29)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.581738 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.582967 434971 task_exit.go:204] [ 2575( 28): 2575( 28)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, 0x0, 0x24) D0318 17:09:38.585984 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.586021 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 38 D0318 17:09:38.586035 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.586283 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843e2c1ae:sysno 230 D0318 17:09:38.586359 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 43 D0318 17:09:38.586419 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843e2c1ae trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.590439 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.590492 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 39 D0318 17:09:38.590508 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.590829 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.590859 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 40 D0318 17:09:38.590871 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.590949 434971 usertrap_amd64.go:212] [ 2576( 76): 2578( 77)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.590984 434971 usertrap_amd64.go:122] [ 2576( 76): 2578( 77)] Allocate a new trap: 0xc008058a20 41 D0318 17:09:38.590997 434971 usertrap_amd64.go:225] [ 2576( 76): 2578( 77)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.592327 434971 usertrap_amd64.go:212] [ 2576( 76): 2576( 76)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.592361 434971 usertrap_amd64.go:122] [ 2576( 76): 2576( 76)] Allocate a new trap: 0xc008058a20 42 D0318 17:09:38.592373 434971 usertrap_amd64.go:225] [ 2576( 76): 2576( 76)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.593337 434971 task_exit.go:204] [ 2576( 76): 2576( 76)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.593396 434971 task_exit.go:204] [ 2576( 76): 2576( 76)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.593425 434971 task_signals.go:204] [ 2576( 76): 2578( 77)] Signal 9, PID: 2576, TID: 2578, fault addr: 0x0: terminating thread group D0318 17:09:38.593441 434971 task_exit.go:204] [ 2576( 76): 2578( 77)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.593816 434971 task_exit.go:204] [ 2576( 76): 2578( 77)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.593845 434971 task_exit.go:204] [ 2576( 76): 2578( 77)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.593856 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.594780 434971 task_exit.go:204] [ 2576( 76): 2576( 76)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: msgget$private(0x0, 0x100) D0318 17:09:38.596728 434971 usertrap_amd64.go:212] [ 2567( 691): 2567( 691)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.596762 434971 usertrap_amd64.go:122] [ 2567( 691): 2567( 691)] Allocate a new trap: 0xc0080589c0 44 D0318 17:09:38.596775 434971 usertrap_amd64.go:225] [ 2567( 691): 2567( 691)] Apply the binary patch addr 555843dffc93 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0318 17:09:38.597670 434971 task_exit.go:204] [ 2567( 691): 2567( 691)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.597720 434971 task_exit.go:204] [ 2567( 691): 2567( 691)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.597743 434971 task_signals.go:204] [ 2567( 691): 2569( 692)] Signal 9, PID: 2567, TID: 2569, fault addr: 0x0: terminating thread group D0318 17:09:38.597757 434971 task_exit.go:204] [ 2567( 691): 2569( 692)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.598087 434971 task_exit.go:204] [ 2567( 691): 2569( 692)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.598167 434971 task_exit.go:204] [ 2567( 691): 2569( 692)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.598198 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.598942 434971 task_exit.go:204] [ 2567( 691): 2567( 691)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) D0318 17:09:38.604448 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.604497 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 36 D0318 17:09:38.604616 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.606180 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.606229 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 37 D0318 17:09:38.606249 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.611381 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.611429 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 38 D0318 17:09:38.611443 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.612571 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.612614 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 36 D0318 17:09:38.612752 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.614146 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.614191 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 37 D0318 17:09:38.614208 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.619474 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.619547 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 39 D0318 17:09:38.619569 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.621710 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.621756 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 40 D0318 17:09:38.621771 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.621917 434971 usertrap_amd64.go:212] [ 2579( 30): 2581( 31)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.621964 434971 usertrap_amd64.go:122] [ 2579( 30): 2581( 31)] Allocate a new trap: 0xc0084c2f90 41 D0318 17:09:38.621983 434971 usertrap_amd64.go:225] [ 2579( 30): 2581( 31)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.622228 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.622256 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 38 D0318 17:09:38.622269 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.624209 434971 usertrap_amd64.go:212] [ 2579( 30): 2579( 30)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.624295 434971 usertrap_amd64.go:122] [ 2579( 30): 2579( 30)] Allocate a new trap: 0xc0084c2f90 42 D0318 17:09:38.624327 434971 usertrap_amd64.go:225] [ 2579( 30): 2579( 30)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.626200 434971 task_exit.go:204] [ 2579( 30): 2579( 30)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.626279 434971 task_exit.go:204] [ 2579( 30): 2579( 30)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.626314 434971 task_signals.go:204] [ 2579( 30): 2581( 31)] Signal 9, PID: 2579, TID: 2581, fault addr: 0x0: terminating thread group D0318 17:09:38.626330 434971 task_exit.go:204] [ 2579( 30): 2581( 31)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.626731 434971 task_exit.go:204] [ 2579( 30): 2581( 31)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.626863 434971 task_exit.go:204] [ 2579( 30): 2581( 31)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.626984 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.627100 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.627109 434971 task_exit.go:204] [ 2579( 30): 2579( 30)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.627270 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 39 D0318 17:09:38.627365 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.627812 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.627856 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 40 D0318 17:09:38.627874 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) 17:09:38 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) write$char_usb(r2, 0x0, 0x0) D0318 17:09:38.628242 434971 usertrap_amd64.go:212] [ 2580( 78): 2583( 79)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.628275 434971 usertrap_amd64.go:122] [ 2580( 78): 2583( 79)] Allocate a new trap: 0xc000d15920 41 D0318 17:09:38.628289 434971 usertrap_amd64.go:225] [ 2580( 78): 2583( 79)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.628745 434971 usertrap_amd64.go:212] [ 2580( 78): 2580( 78)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.628776 434971 usertrap_amd64.go:122] [ 2580( 78): 2580( 78)] Allocate a new trap: 0xc000d15920 42 D0318 17:09:38.628798 434971 usertrap_amd64.go:225] [ 2580( 78): 2580( 78)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.628862 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.628920 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 37 D0318 17:09:38.629071 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.630534 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.630577 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 38 D0318 17:09:38.630598 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.630701 434971 task_exit.go:204] [ 2580( 78): 2580( 78)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.630758 434971 task_exit.go:204] [ 2580( 78): 2580( 78)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.630785 434971 task_signals.go:204] [ 2580( 78): 2583( 79)] Signal 9, PID: 2580, TID: 2583, fault addr: 0x0: terminating thread group D0318 17:09:38.630905 434971 task_exit.go:204] [ 2580( 78): 2583( 79)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.631197 434971 task_exit.go:204] [ 2580( 78): 2583( 79)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.631234 434971 task_exit.go:204] [ 2580( 78): 2583( 79)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.631246 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.631377 434971 task_exit.go:204] [ 2580( 78): 2580( 78)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0) D0318 17:09:38.636439 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.636484 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 36 D0318 17:09:38.636601 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.638069 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.638127 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 39 D0318 17:09:38.638141 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.639021 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.639122 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 37 D0318 17:09:38.639135 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.643262 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.643305 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 40 D0318 17:09:38.643321 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.643500 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.643514 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 41 D0318 17:09:38.643524 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.644022 434971 usertrap_amd64.go:212] [ 2582( 693): 2586( 694)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.644076 434971 usertrap_amd64.go:122] [ 2582( 693): 2586( 694)] Allocate a new trap: 0xc000d15950 42 D0318 17:09:38.644095 434971 usertrap_amd64.go:225] [ 2582( 693): 2586( 694)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.644498 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.644531 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 38 D0318 17:09:38.644547 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.645053 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.645088 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 36 D0318 17:09:38.645160 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.645190 434971 usertrap_amd64.go:212] [ 2582( 693): 2582( 693)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.645234 434971 usertrap_amd64.go:122] [ 2582( 693): 2582( 693)] Allocate a new trap: 0xc000d15950 43 D0318 17:09:38.645250 434971 usertrap_amd64.go:225] [ 2582( 693): 2582( 693)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.647646 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.647685 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 37 D0318 17:09:38.647702 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.648366 434971 task_exit.go:204] [ 2582( 693): 2582( 693)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.648541 434971 task_exit.go:204] [ 2582( 693): 2582( 693)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.648590 434971 task_signals.go:204] [ 2582( 693): 2586( 694)] Signal 9, PID: 2582, TID: 2586, fault addr: 0x0: terminating thread group D0318 17:09:38.648604 434971 task_exit.go:204] [ 2582( 693): 2586( 694)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.648934 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.648966 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 39 D0318 17:09:38.648978 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.649096 434971 task_exit.go:204] [ 2582( 693): 2586( 694)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.649128 434971 task_exit.go:204] [ 2582( 693): 2586( 694)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.649148 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.649353 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.649390 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 40 D0318 17:09:38.649401 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.649570 434971 usertrap_amd64.go:212] [ 2584( 32): 2587( 33)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.649629 434971 usertrap_amd64.go:122] [ 2584( 32): 2587( 33)] Allocate a new trap: 0xc000d15980 41 D0318 17:09:38.649641 434971 usertrap_amd64.go:225] [ 2584( 32): 2587( 33)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.650219 434971 task_exit.go:204] [ 2582( 693): 2582( 693)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system', 0x240200, 0xea) D0318 17:09:38.651340 434971 usertrap_amd64.go:212] [ 2584( 32): 2584( 32)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.651430 434971 usertrap_amd64.go:122] [ 2584( 32): 2584( 32)] Allocate a new trap: 0xc000d15980 42 D0318 17:09:38.651456 434971 usertrap_amd64.go:225] [ 2584( 32): 2584( 32)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.653777 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.653816 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 38 D0318 17:09:38.653832 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.654649 434971 task_exit.go:204] [ 2584( 32): 2584( 32)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.654697 434971 task_signals.go:204] [ 2584( 32): 2587( 33)] Signal 9, PID: 2584, TID: 2587, fault addr: 0x0: terminating thread group D0318 17:09:38.654734 434971 task_exit.go:204] [ 2584( 32): 2587( 33)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.654768 434971 task_exit.go:204] [ 2584( 32): 2587( 33)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.654777 434971 task_exit.go:204] [ 2584( 32): 2587( 33)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.655226 434971 task_exit.go:204] [ 2584( 32): 2584( 32)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.655277 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.655537 434971 task_exit.go:204] [ 2584( 32): 2584( 32)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) D0318 17:09:38.659522 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.659569 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 37 D0318 17:09:38.659532 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.659659 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 39 D0318 17:09:38.659674 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.659729 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.659891 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.659920 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 40 D0318 17:09:38.659933 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.660362 434971 usertrap_amd64.go:212] [ 2585( 80): 2589( 81)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.660400 434971 usertrap_amd64.go:122] [ 2585( 80): 2589( 81)] Allocate a new trap: 0xc000d159b0 41 D0318 17:09:38.660417 434971 usertrap_amd64.go:225] [ 2585( 80): 2589( 81)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.661406 434971 usertrap_amd64.go:212] [ 2585( 80): 2585( 80)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.661439 434971 usertrap_amd64.go:122] [ 2585( 80): 2585( 80)] Allocate a new trap: 0xc000d159b0 42 D0318 17:09:38.661451 434971 usertrap_amd64.go:225] [ 2585( 80): 2585( 80)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.662432 434971 task_exit.go:204] [ 2585( 80): 2585( 80)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.662484 434971 task_exit.go:204] [ 2585( 80): 2585( 80)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.662507 434971 task_signals.go:204] [ 2585( 80): 2589( 81)] Signal 9, PID: 2585, TID: 2589, fault addr: 0x0: terminating thread group D0318 17:09:38.662524 434971 task_exit.go:204] [ 2585( 80): 2589( 81)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.662787 434971 task_exit.go:204] [ 2585( 80): 2589( 81)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.662831 434971 task_exit.go:204] [ 2585( 80): 2589( 81)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.662841 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.663275 434971 task_exit.go:204] [ 2585( 80): 2585( 80)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = dup3(r0, r1, 0x0) write$cgroup_type(r2, 0x0, 0x0) D0318 17:09:38.665145 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.665177 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 38 D0318 17:09:38.665188 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.665408 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.665442 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 36 D0318 17:09:38.665554 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.667429 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.667472 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 37 D0318 17:09:38.667485 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.669663 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.669759 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 39 D0318 17:09:38.669791 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.673274 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.673310 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 38 D0318 17:09:38.673332 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.673383 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.673408 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 40 D0318 17:09:38.673439 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.673689 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.673728 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 41 D0318 17:09:38.673742 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.674957 434971 usertrap_amd64.go:212] [ 2588( 695): 2592( 696)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.674992 434971 usertrap_amd64.go:122] [ 2588( 695): 2592( 696)] Allocate a new trap: 0xc000b1cf90 42 D0318 17:09:38.675002 434971 usertrap_amd64.go:225] [ 2588( 695): 2592( 696)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.675772 434971 usertrap_amd64.go:212] [ 2588( 695): 2588( 695)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.675804 434971 usertrap_amd64.go:122] [ 2588( 695): 2588( 695)] Allocate a new trap: 0xc000b1cf90 43 D0318 17:09:38.675816 434971 usertrap_amd64.go:225] [ 2588( 695): 2588( 695)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.676762 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.676796 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 39 D0318 17:09:38.676808 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.676889 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.676934 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 36 D0318 17:09:38.676977 434971 task_exit.go:204] [ 2588( 695): 2588( 695)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.677016 434971 task_exit.go:204] [ 2588( 695): 2588( 695)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.677033 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.677046 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 40 D0318 17:09:38.677054 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.677059 434971 task_signals.go:204] [ 2588( 695): 2592( 696)] Signal 9, PID: 2588, TID: 2592, fault addr: 0x0: terminating thread group D0318 17:09:38.677093 434971 task_exit.go:204] [ 2588( 695): 2592( 696)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.677145 434971 usertrap_amd64.go:212] [ 2590( 34): 2593( 35)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.677163 434971 usertrap_amd64.go:122] [ 2590( 34): 2593( 35)] Allocate a new trap: 0xc0084c2fc0 41 D0318 17:09:38.677012 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.677179 434971 usertrap_amd64.go:225] [ 2590( 34): 2593( 35)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.677534 434971 task_exit.go:204] [ 2588( 695): 2592( 696)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.677579 434971 task_exit.go:204] [ 2588( 695): 2592( 696)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.677593 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.678379 434971 usertrap_amd64.go:212] [ 2590( 34): 2590( 34)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.678407 434971 usertrap_amd64.go:122] [ 2590( 34): 2590( 34)] Allocate a new trap: 0xc0084c2fc0 42 D0318 17:09:38.678423 434971 usertrap_amd64.go:225] [ 2590( 34): 2590( 34)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.678599 434971 task_exit.go:204] [ 2588( 695): 2588( 695)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x14) D0318 17:09:38.680016 434971 task_exit.go:204] [ 2590( 34): 2590( 34)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.680085 434971 task_exit.go:204] [ 2590( 34): 2590( 34)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.680114 434971 task_signals.go:204] [ 2590( 34): 2593( 35)] Signal 9, PID: 2590, TID: 2593, fault addr: 0x0: terminating thread group D0318 17:09:38.680134 434971 task_exit.go:204] [ 2590( 34): 2593( 35)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.680599 434971 task_exit.go:204] [ 2590( 34): 2593( 35)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.680634 434971 task_exit.go:204] [ 2590( 34): 2593( 35)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.680653 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.681808 434971 task_exit.go:204] [ 2590( 34): 2590( 34)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, r0) write$cgroup_freezer_state(r1, 0x0, 0x0) D0318 17:09:38.687459 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.687513 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 37 D0318 17:09:38.687672 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.688572 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.688605 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 37 D0318 17:09:38.688618 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.689421 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.689454 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 38 D0318 17:09:38.689469 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.694393 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.694436 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 38 D0318 17:09:38.694453 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.695089 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.695130 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 39 D0318 17:09:38.695147 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.698598 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.698639 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 36 D0318 17:09:38.698773 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.699246 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.699295 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 40 D0318 17:09:38.699311 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.699797 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.699834 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 41 D0318 17:09:38.699847 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.700133 434971 usertrap_amd64.go:212] [ 2594( 697): 2596( 698)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.700178 434971 usertrap_amd64.go:122] [ 2594( 697): 2596( 698)] Allocate a new trap: 0xc001124390 42 D0318 17:09:38.700195 434971 usertrap_amd64.go:225] [ 2594( 697): 2596( 698)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.700399 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.700449 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 37 D0318 17:09:38.700467 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.700853 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.700890 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 39 D0318 17:09:38.700902 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.701144 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.701183 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 40 D0318 17:09:38.701199 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.701299 434971 usertrap_amd64.go:212] [ 2594( 697): 2594( 697)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.701376 434971 usertrap_amd64.go:122] [ 2594( 697): 2594( 697)] Allocate a new trap: 0xc001124390 43 D0318 17:09:38.701396 434971 usertrap_amd64.go:225] [ 2594( 697): 2594( 697)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.701347 434971 usertrap_amd64.go:212] [ 2591( 82): 2597( 83)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.701487 434971 usertrap_amd64.go:122] [ 2591( 82): 2597( 83)] Allocate a new trap: 0xc0083c8660 41 D0318 17:09:38.701504 434971 usertrap_amd64.go:225] [ 2591( 82): 2597( 83)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.702740 434971 task_exit.go:204] [ 2594( 697): 2594( 697)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.702851 434971 task_exit.go:204] [ 2594( 697): 2594( 697)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.702975 434971 task_signals.go:204] [ 2594( 697): 2596( 698)] Signal 9, PID: 2594, TID: 2596, fault addr: 0x0: terminating thread group D0318 17:09:38.703023 434971 task_exit.go:204] [ 2594( 697): 2596( 698)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.703029 434971 usertrap_amd64.go:212] [ 2591( 82): 2591( 82)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.703099 434971 usertrap_amd64.go:122] [ 2591( 82): 2591( 82)] Allocate a new trap: 0xc0083c8660 42 D0318 17:09:38.703130 434971 usertrap_amd64.go:225] [ 2591( 82): 2591( 82)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.703763 434971 task_exit.go:204] [ 2594( 697): 2596( 698)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.703800 434971 task_exit.go:204] [ 2594( 697): 2596( 698)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.703812 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.704495 434971 task_exit.go:204] [ 2591( 82): 2591( 82)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.704561 434971 task_exit.go:204] [ 2591( 82): 2591( 82)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.704592 434971 task_signals.go:204] [ 2591( 82): 2597( 83)] Signal 9, PID: 2591, TID: 2597, fault addr: 0x0: terminating thread group D0318 17:09:38.704609 434971 task_exit.go:204] [ 2591( 82): 2597( 83)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.704963 434971 task_exit.go:204] [ 2591( 82): 2597( 83)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.705009 434971 task_exit.go:204] [ 2591( 82): 2597( 83)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.705027 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.705089 434971 task_exit.go:204] [ 2591( 82): 2591( 82)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.705151 434971 task_exit.go:204] [ 2594( 697): 2594( 697)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) 17:09:38 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) D0318 17:09:38.713675 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.713718 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 38 D0318 17:09:38.713733 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.716884 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.716936 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 39 D0318 17:09:38.716951 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.717223 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.717256 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 40 D0318 17:09:38.717279 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.717326 434971 usertrap_amd64.go:212] [ 2595( 36): 2599( 37)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.717343 434971 usertrap_amd64.go:122] [ 2595( 36): 2599( 37)] Allocate a new trap: 0xc0084c2ff0 41 D0318 17:09:38.717346 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.717354 434971 usertrap_amd64.go:225] [ 2595( 36): 2599( 37)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.717360 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 37 D0318 17:09:38.717464 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.718511 434971 usertrap_amd64.go:212] [ 2595( 36): 2595( 36)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.718556 434971 usertrap_amd64.go:122] [ 2595( 36): 2595( 36)] Allocate a new trap: 0xc0084c2ff0 42 D0318 17:09:38.718571 434971 usertrap_amd64.go:225] [ 2595( 36): 2595( 36)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.719009 434971 task_exit.go:204] [ 2595( 36): 2595( 36)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.719258 434971 task_exit.go:204] [ 2595( 36): 2595( 36)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.719306 434971 task_signals.go:204] [ 2595( 36): 2599( 37)] Signal 9, PID: 2595, TID: 2599, fault addr: 0x0: terminating thread group D0318 17:09:38.719322 434971 task_exit.go:204] [ 2595( 36): 2599( 37)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.719753 434971 task_exit.go:204] [ 2595( 36): 2599( 37)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.719854 434971 task_exit.go:204] [ 2595( 36): 2599( 37)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.719896 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.719963 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 38 D0318 17:09:38.719977 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.719913 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.720717 434971 task_exit.go:204] [ 2595( 36): 2595( 36)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = mq_open(&(0x7f0000000180)='#\x00\x90\x1d6\xeb', 0x40, 0x0, &(0x7f0000000100)={0xffe, 0x9, 0x1f}) dup3(r2, r0, 0x80000) pread64(r1, 0x0, 0x16, 0x62) fcntl$F_GET_RW_HINT(r1, 0x40b, 0x0) mq_open(&(0x7f0000000240)='\t\x00\x00\x006\x94\xeb~\xb3\x19PqWL\x0e`\xfcL\xfc\x80\xb1\x1f\x91h8<\n6|\xa6\xa4\t1~\x91jB\xd3\x1f\xe5!8\xab\xb4-\xf7W\x86j\fM\x9d\x9bW\x0f\xc9\xeb\x185\xd0X\xdfm\xef\xcd\x89\xeb\x93u\xb2\xdd~E\x817\xc2B\xa2*\xc8\xc0\x02Qui\x949\xee\x9d3F\xb5K\xad\xacK\xe6\xbf\xcb', 0x1, 0x80, &(0x7f0000000140)={0x100000001, 0x1, 0x0, 0x7f}) D0318 17:09:38.725309 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.725582 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 39 D0318 17:09:38.725661 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.728056 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.728105 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 36 D0318 17:09:38.728229 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.729088 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.729122 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 40 D0318 17:09:38.729140 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.729454 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.729492 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 41 D0318 17:09:38.729508 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.729533 434971 usertrap_amd64.go:212] [ 2598( 699): 2601( 700)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.729558 434971 usertrap_amd64.go:122] [ 2598( 699): 2601( 700)] Allocate a new trap: 0xc0011952f0 42 D0318 17:09:38.729570 434971 usertrap_amd64.go:225] [ 2598( 699): 2601( 700)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.730370 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.730406 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 37 D0318 17:09:38.730421 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.730707 434971 usertrap_amd64.go:212] [ 2598( 699): 2598( 699)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.730746 434971 usertrap_amd64.go:122] [ 2598( 699): 2598( 699)] Allocate a new trap: 0xc0011952f0 43 D0318 17:09:38.730761 434971 usertrap_amd64.go:225] [ 2598( 699): 2598( 699)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.732166 434971 task_exit.go:204] [ 2598( 699): 2598( 699)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.732223 434971 task_exit.go:204] [ 2598( 699): 2598( 699)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.732246 434971 task_signals.go:204] [ 2598( 699): 2601( 700)] Signal 9, PID: 2598, TID: 2601, fault addr: 0x0: terminating thread group D0318 17:09:38.732260 434971 task_exit.go:204] [ 2598( 699): 2601( 700)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.732634 434971 task_exit.go:204] [ 2598( 699): 2601( 700)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.732677 434971 task_exit.go:204] [ 2598( 699): 2601( 700)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.732705 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.733491 434971 task_exit.go:204] [ 2598( 699): 2598( 699)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x95) D0318 17:09:38.737155 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.737195 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 38 D0318 17:09:38.737212 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.741353 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.741376 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 37 D0318 17:09:38.741450 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.741927 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.741971 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 39 D0318 17:09:38.741989 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.742506 434971 usertrap_amd64.go:212] [ 2600( 84): 2604( 85)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.742541 434971 usertrap_amd64.go:122] [ 2600( 84): 2604( 85)] Allocate a new trap: 0xc008161980 40 D0318 17:09:38.742559 434971 usertrap_amd64.go:225] [ 2600( 84): 2604( 85)] Apply the binary patch addr 55857d8bf320 trap addr 65c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.743034 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.743156 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 41 D0318 17:09:38.743194 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d8bfc10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.743100 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.743223 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 38 D0318 17:09:38.743257 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.744477 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.744516 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 36 D0318 17:09:38.744661 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.745779 434971 usertrap_amd64.go:212] [ 2600( 84): 2600( 84)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.745799 434971 usertrap_amd64.go:122] [ 2600( 84): 2600( 84)] Allocate a new trap: 0xc008161980 42 D0318 17:09:38.745812 434971 usertrap_amd64.go:225] [ 2600( 84): 2600( 84)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.746251 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.746277 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 37 D0318 17:09:38.746291 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.748028 434971 task_exit.go:204] [ 2600( 84): 2600( 84)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.748092 434971 task_exit.go:204] [ 2600( 84): 2600( 84)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.748125 434971 task_signals.go:204] [ 2600( 84): 2604( 85)] Signal 9, PID: 2600, TID: 2604, fault addr: 0x0: terminating thread group D0318 17:09:38.748161 434971 task_exit.go:204] [ 2600( 84): 2604( 85)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.748502 434971 task_exit.go:204] [ 2600( 84): 2604( 85)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.748656 434971 task_exit.go:204] [ 2600( 84): 2604( 85)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.748876 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.749086 434971 task_exit.go:204] [ 2600( 84): 2600( 84)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.749102 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.749186 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 39 D0318 17:09:38.749224 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) 17:09:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$cgroup_type(r1, 0x0, 0x0) D0318 17:09:38.751573 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.751645 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 38 D0318 17:09:38.751663 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.753558 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.753656 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 40 D0318 17:09:38.753696 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.754022 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.754151 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 41 D0318 17:09:38.754185 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.754249 434971 usertrap_amd64.go:212] [ 2602( 701): 2606( 702)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.754276 434971 usertrap_amd64.go:122] [ 2602( 701): 2606( 702)] Allocate a new trap: 0xc0015962a0 42 D0318 17:09:38.754291 434971 usertrap_amd64.go:225] [ 2602( 701): 2606( 702)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.755150 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.755187 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 39 D0318 17:09:38.755200 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.755562 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.755594 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 40 D0318 17:09:38.755653 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.755707 434971 usertrap_amd64.go:212] [ 2603( 38): 2607( 39)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.755739 434971 usertrap_amd64.go:122] [ 2603( 38): 2607( 39)] Allocate a new trap: 0xc008058ab0 41 D0318 17:09:38.755749 434971 usertrap_amd64.go:225] [ 2603( 38): 2607( 39)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.756338 434971 usertrap_amd64.go:212] [ 2602( 701): 2602( 701)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.756368 434971 usertrap_amd64.go:122] [ 2602( 701): 2602( 701)] Allocate a new trap: 0xc0015962a0 43 D0318 17:09:38.756379 434971 usertrap_amd64.go:225] [ 2602( 701): 2602( 701)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.757404 434971 task_exit.go:204] [ 2602( 701): 2602( 701)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.757458 434971 task_exit.go:204] [ 2602( 701): 2602( 701)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.757484 434971 task_signals.go:204] [ 2602( 701): 2606( 702)] Signal 9, PID: 2602, TID: 2606, fault addr: 0x0: terminating thread group D0318 17:09:38.757500 434971 task_exit.go:204] [ 2602( 701): 2606( 702)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.757909 434971 task_exit.go:204] [ 2602( 701): 2606( 702)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.757947 434971 task_exit.go:204] [ 2602( 701): 2606( 702)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.757970 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.758289 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.758319 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 36 D0318 17:09:38.758426 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.758743 434971 usertrap_amd64.go:212] [ 2603( 38): 2603( 38)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.758772 434971 usertrap_amd64.go:122] [ 2603( 38): 2603( 38)] Allocate a new trap: 0xc008058ab0 42 D0318 17:09:38.758786 434971 usertrap_amd64.go:225] [ 2603( 38): 2603( 38)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.759094 434971 task_exit.go:204] [ 2602( 701): 2602( 701)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000001000)) r1 = epoll_create(0x5) dup3(r0, r1, 0x0) D0318 17:09:38.760608 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.760637 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 37 D0318 17:09:38.760647 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.761717 434971 task_exit.go:204] [ 2603( 38): 2603( 38)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.761772 434971 task_exit.go:204] [ 2603( 38): 2603( 38)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.761850 434971 task_signals.go:204] [ 2603( 38): 2607( 39)] Signal 9, PID: 2603, TID: 2607, fault addr: 0x0: terminating thread group D0318 17:09:38.761888 434971 task_exit.go:204] [ 2603( 38): 2607( 39)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.762486 434971 task_exit.go:204] [ 2603( 38): 2607( 39)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.762534 434971 task_exit.go:204] [ 2603( 38): 2607( 39)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.762559 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.762616 434971 task_exit.go:204] [ 2603( 38): 2603( 38)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001780), 0x2000, 0x0) D0318 17:09:38.767701 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.767748 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 38 D0318 17:09:38.767761 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.768826 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.768869 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 37 D0318 17:09:38.768986 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.770212 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.770297 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 38 D0318 17:09:38.770369 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.771323 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.771401 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 39 D0318 17:09:38.771514 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.771899 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.771940 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 40 D0318 17:09:38.771959 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.772079 434971 usertrap_amd64.go:212] [ 2605( 86): 2610( 87)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.772127 434971 usertrap_amd64.go:122] [ 2605( 86): 2610( 87)] Allocate a new trap: 0xc008058ae0 41 D0318 17:09:38.772137 434971 usertrap_amd64.go:225] [ 2605( 86): 2610( 87)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.774481 434971 usertrap_amd64.go:212] [ 2605( 86): 2605( 86)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.774518 434971 usertrap_amd64.go:122] [ 2605( 86): 2605( 86)] Allocate a new trap: 0xc008058ae0 42 D0318 17:09:38.774535 434971 usertrap_amd64.go:225] [ 2605( 86): 2605( 86)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.774943 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.774975 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 36 D0318 17:09:38.775081 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.775516 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.775549 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 39 D0318 17:09:38.775558 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.776632 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.776721 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 37 D0318 17:09:38.776744 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.776688 434971 task_exit.go:204] [ 2605( 86): 2605( 86)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.776836 434971 task_exit.go:204] [ 2605( 86): 2605( 86)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.776872 434971 task_signals.go:204] [ 2605( 86): 2610( 87)] Signal 9, PID: 2605, TID: 2610, fault addr: 0x0: terminating thread group D0318 17:09:38.776911 434971 task_exit.go:204] [ 2605( 86): 2610( 87)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.777403 434971 task_exit.go:204] [ 2605( 86): 2610( 87)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.777439 434971 task_exit.go:204] [ 2605( 86): 2610( 87)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.777452 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.778755 434971 task_exit.go:204] [ 2605( 86): 2605( 86)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.779493 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.779512 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 40 D0318 17:09:38.779523 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) 17:09:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = getgid() fchown(r0, 0x0, r1) D0318 17:09:38.779818 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.779936 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 41 D0318 17:09:38.779992 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.780089 434971 usertrap_amd64.go:212] [ 2608( 703): 2611( 704)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.780115 434971 usertrap_amd64.go:122] [ 2608( 703): 2611( 704)] Allocate a new trap: 0xc001195350 42 D0318 17:09:38.780126 434971 usertrap_amd64.go:225] [ 2608( 703): 2611( 704)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.780923 434971 usertrap_amd64.go:212] [ 2608( 703): 2611( 704)] Found the pattern at ip 555843dff999:sysno 257 D0318 17:09:38.781016 434971 usertrap_amd64.go:122] [ 2608( 703): 2611( 704)] Allocate a new trap: 0xc001195350 43 D0318 17:09:38.781028 434971 usertrap_amd64.go:225] [ 2608( 703): 2611( 704)] Apply the binary patch addr 555843dff999 trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.782009 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.782038 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 38 D0318 17:09:38.782053 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.783774 434971 usertrap_amd64.go:212] [ 2608( 703): 2608( 703)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.783810 434971 usertrap_amd64.go:122] [ 2608( 703): 2608( 703)] Allocate a new trap: 0xc001195350 44 D0318 17:09:38.783826 434971 usertrap_amd64.go:225] [ 2608( 703): 2608( 703)] Apply the binary patch addr 555843dffc93 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0318 17:09:38.784688 434971 task_exit.go:204] [ 2608( 703): 2608( 703)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.785189 434971 task_exit.go:204] [ 2608( 703): 2608( 703)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.785407 434971 task_signals.go:204] [ 2608( 703): 2611( 704)] Signal 9, PID: 2608, TID: 2611, fault addr: 0x0: terminating thread group D0318 17:09:38.785479 434971 task_exit.go:204] [ 2608( 703): 2611( 704)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.785780 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.785817 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 39 D0318 17:09:38.785831 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.786098 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.786151 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 40 D0318 17:09:38.786165 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.786212 434971 usertrap_amd64.go:212] [ 2609( 40): 2612( 41)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.786249 434971 usertrap_amd64.go:122] [ 2609( 40): 2612( 41)] Allocate a new trap: 0xc0084c3020 41 D0318 17:09:38.786262 434971 usertrap_amd64.go:225] [ 2609( 40): 2612( 41)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.786299 434971 task_exit.go:204] [ 2608( 703): 2611( 704)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.786324 434971 task_exit.go:204] [ 2608( 703): 2611( 704)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.786335 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.787035 434971 usertrap_amd64.go:212] [ 2609( 40): 2609( 40)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.787122 434971 usertrap_amd64.go:122] [ 2609( 40): 2609( 40)] Allocate a new trap: 0xc0084c3020 42 D0318 17:09:38.787182 434971 usertrap_amd64.go:225] [ 2609( 40): 2609( 40)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.787394 434971 task_exit.go:204] [ 2608( 703): 2608( 703)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/net', 0x0, 0x0) fchown(r0, 0x0, 0x0) D0318 17:09:38.788875 434971 task_exit.go:204] [ 2609( 40): 2609( 40)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.789049 434971 task_exit.go:204] [ 2609( 40): 2609( 40)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.789141 434971 task_signals.go:204] [ 2609( 40): 2612( 41)] Signal 9, PID: 2609, TID: 2612, fault addr: 0x0: terminating thread group D0318 17:09:38.789191 434971 task_exit.go:204] [ 2609( 40): 2612( 41)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.789543 434971 task_exit.go:204] [ 2609( 40): 2612( 41)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.789560 434971 task_exit.go:204] [ 2609( 40): 2612( 41)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.789572 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.790339 434971 task_exit.go:204] [ 2609( 40): 2609( 40)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) read$watch_queue(r1, 0x0, 0x0) D0318 17:09:38.797730 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:38.797767 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 37 D0318 17:09:38.797895 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.799462 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:38.799508 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 38 D0318 17:09:38.799507 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:38.799524 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.799534 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 36 D0318 17:09:38.799693 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:38.804472 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:38.804507 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 39 D0318 17:09:38.804522 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.807874 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:38.807933 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 40 D0318 17:09:38.807954 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.808210 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:38.808364 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 41 D0318 17:09:38.808406 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.808494 434971 usertrap_amd64.go:212] [ 2613( 705): 2616( 706)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:38.808528 434971 usertrap_amd64.go:122] [ 2613( 705): 2616( 706)] Allocate a new trap: 0xc008058b40 42 D0318 17:09:38.808541 434971 usertrap_amd64.go:225] [ 2613( 705): 2616( 706)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.809129 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:38.809152 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 37 D0318 17:09:38.809166 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:38.809632 434971 usertrap_amd64.go:212] [ 2613( 705): 2613( 705)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:38.809737 434971 usertrap_amd64.go:122] [ 2613( 705): 2613( 705)] Allocate a new trap: 0xc008058b40 43 D0318 17:09:38.809797 434971 usertrap_amd64.go:225] [ 2613( 705): 2613( 705)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:38.810909 434971 task_exit.go:204] [ 2613( 705): 2613( 705)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.810969 434971 task_exit.go:204] [ 2613( 705): 2613( 705)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.811000 434971 task_signals.go:204] [ 2613( 705): 2616( 706)] Signal 9, PID: 2613, TID: 2616, fault addr: 0x0: terminating thread group D0318 17:09:38.811019 434971 task_exit.go:204] [ 2613( 705): 2616( 706)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.811496 434971 task_exit.go:204] [ 2613( 705): 2616( 706)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.811574 434971 task_exit.go:204] [ 2613( 705): 2616( 706)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.811658 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:38.811787 434971 task_exit.go:204] [ 2613( 705): 2613( 705)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.813019 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:38.813058 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 36 D0318 17:09:38.813187 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:38.814733 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:38.814821 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 37 D0318 17:09:38.814889 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:38.820510 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:38.820546 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 38 D0318 17:09:38.820561 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:38.821754 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:38.821801 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 38 D0318 17:09:38.821819 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:38.826248 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:38.826312 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 39 D0318 17:09:38.826328 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:38.826589 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:38.826625 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 40 D0318 17:09:38.826642 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:38.826684 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:38.826691 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 39 D0318 17:09:38.826700 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:38.826924 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:38.826957 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 40 D0318 17:09:38.826969 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:38.826935 434971 usertrap_amd64.go:212] [ 2615( 88): 2617( 89)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:38.827011 434971 usertrap_amd64.go:122] [ 2615( 88): 2617( 89)] Allocate a new trap: 0xc001405fb0 41 D0318 17:09:38.827024 434971 usertrap_amd64.go:225] [ 2615( 88): 2617( 89)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:38.827086 434971 usertrap_amd64.go:212] [ 2614( 42): 2618( 43)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:38.827114 434971 usertrap_amd64.go:122] [ 2614( 42): 2618( 43)] Allocate a new trap: 0xc0083c86c0 41 D0318 17:09:38.827128 434971 usertrap_amd64.go:225] [ 2614( 42): 2618( 43)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:38.828458 434971 usertrap_amd64.go:212] [ 2614( 42): 2614( 42)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:38.828516 434971 usertrap_amd64.go:122] [ 2614( 42): 2614( 42)] Allocate a new trap: 0xc0083c86c0 42 D0318 17:09:38.828533 434971 usertrap_amd64.go:225] [ 2614( 42): 2614( 42)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:38.828514 434971 usertrap_amd64.go:212] [ 2615( 88): 2615( 88)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:38.828635 434971 usertrap_amd64.go:122] [ 2615( 88): 2615( 88)] Allocate a new trap: 0xc001405fb0 42 D0318 17:09:38.828651 434971 usertrap_amd64.go:225] [ 2615( 88): 2615( 88)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:38.830289 434971 task_exit.go:204] [ 2614( 42): 2614( 42)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.830349 434971 task_exit.go:204] [ 2614( 42): 2614( 42)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.830378 434971 task_signals.go:204] [ 2614( 42): 2618( 43)] Signal 9, PID: 2614, TID: 2618, fault addr: 0x0: terminating thread group D0318 17:09:38.830432 434971 task_exit.go:204] [ 2614( 42): 2618( 43)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.830884 434971 task_exit.go:204] [ 2614( 42): 2618( 43)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.830991 434971 task_exit.go:204] [ 2614( 42): 2618( 43)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.831067 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:38.831143 434971 task_signals.go:204] [ 2615( 88): 2617( 89)] Signal 9, PID: 2615, TID: 2617, fault addr: 0x0: terminating thread group D0318 17:09:38.831173 434971 task_exit.go:204] [ 2615( 88): 2615( 88)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.831311 434971 task_exit.go:204] [ 2615( 88): 2615( 88)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.831335 434971 task_exit.go:204] [ 2615( 88): 2617( 89)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:38.831690 434971 task_exit.go:204] [ 2615( 88): 2617( 89)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:38.831720 434971 task_exit.go:204] [ 2615( 88): 2617( 89)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.831731 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:38.832362 434971 task_exit.go:204] [ 2614( 42): 2614( 42)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:38.834677 434971 task_exit.go:204] [ 2615( 88): 2615( 88)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.259843 434971 usertrap_amd64.go:212] [ 2552( 604): 2552( 604)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.259910 434971 usertrap_amd64.go:122] [ 2552( 604): 2552( 604)] Allocate a new trap: 0xc001195230 44 D0318 17:09:39.259932 434971 usertrap_amd64.go:225] [ 2552( 604): 2552( 604)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:39.261153 434971 task_exit.go:204] [ 2552( 604): 2552( 604)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.261227 434971 task_exit.go:204] [ 2552( 604): 2552( 604)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.261278 434971 task_signals.go:204] [ 2552( 604): 2554( 605)] Signal 9, PID: 2552, TID: 2554, fault addr: 0x0: terminating thread group D0318 17:09:39.261323 434971 task_exit.go:204] [ 2552( 604): 2554( 605)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.261774 434971 task_exit.go:204] [ 2552( 604): 2554( 605)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.261800 434971 task_exit.go:204] [ 2552( 604): 2554( 605)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.261815 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.261889 434971 task_exit.go:204] [ 2552( 604): 2552( 604)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: timer_create(0x1, &(0x7f00000012c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000001300)) 17:09:39 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 17:09:39 executing program 3: clock_getres(0x6, &(0x7f0000000240)) 17:09:39 executing program 1: select(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xea60}) D0318 17:09:39.268265 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.268309 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 37 D0318 17:09:39.270008 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.271260 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.271281 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 38 D0318 17:09:39.271294 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.275267 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.275691 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 36 D0318 17:09:39.275586 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.275806 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 39 D0318 17:09:39.275830 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.275920 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.277457 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.277485 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 37 D0318 17:09:39.277503 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.280188 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.280237 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 40 D0318 17:09:39.280253 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.280613 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.280645 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 41 D0318 17:09:39.280664 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.280945 434971 usertrap_amd64.go:212] [ 2620( 707): 2622( 708)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.280970 434971 usertrap_amd64.go:122] [ 2620( 707): 2622( 708)] Allocate a new trap: 0xc001124420 42 D0318 17:09:39.280981 434971 usertrap_amd64.go:225] [ 2620( 707): 2622( 708)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.282483 434971 usertrap_amd64.go:212] [ 2620( 707): 2620( 707)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.282543 434971 usertrap_amd64.go:122] [ 2620( 707): 2620( 707)] Allocate a new trap: 0xc001124420 43 D0318 17:09:39.282558 434971 usertrap_amd64.go:225] [ 2620( 707): 2620( 707)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.284040 434971 task_exit.go:204] [ 2620( 707): 2620( 707)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.284117 434971 task_exit.go:204] [ 2620( 707): 2620( 707)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.284166 434971 task_signals.go:204] [ 2620( 707): 2622( 708)] Signal 9, PID: 2620, TID: 2622, fault addr: 0x0: terminating thread group D0318 17:09:39.284237 434971 task_exit.go:204] [ 2620( 707): 2622( 708)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.284518 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.284555 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 36 D0318 17:09:39.284579 434971 task_exit.go:204] [ 2620( 707): 2622( 708)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.284600 434971 task_exit.go:204] [ 2620( 707): 2622( 708)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.284636 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.284649 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.285504 434971 task_exit.go:204] [ 2620( 707): 2620( 707)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.286987 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.287003 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 37 D0318 17:09:39.287012 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:39 executing program 3: msgget$private(0x0, 0x46) D0318 17:09:39.288059 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.288210 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 38 D0318 17:09:39.288322 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.291844 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.291874 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 39 D0318 17:09:39.291885 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.292074 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.292103 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 40 D0318 17:09:39.292115 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.292142 434971 usertrap_amd64.go:212] [ 2621( 44): 2624( 45)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.292150 434971 usertrap_amd64.go:122] [ 2621( 44): 2624( 45)] Allocate a new trap: 0xc0084c3050 41 D0318 17:09:39.292157 434971 usertrap_amd64.go:225] [ 2621( 44): 2624( 45)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.293131 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.293221 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 38 D0318 17:09:39.293241 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.295815 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.296215 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 39 D0318 17:09:39.296244 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.296921 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.296935 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 40 D0318 17:09:39.296944 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.297136 434971 usertrap_amd64.go:212] [ 2619( 90): 2625( 91)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.297174 434971 usertrap_amd64.go:122] [ 2619( 90): 2625( 91)] Allocate a new trap: 0xc008058ba0 41 D0318 17:09:39.297184 434971 usertrap_amd64.go:225] [ 2619( 90): 2625( 91)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.298921 434971 usertrap_amd64.go:212] [ 2619( 90): 2619( 90)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.298954 434971 usertrap_amd64.go:122] [ 2619( 90): 2619( 90)] Allocate a new trap: 0xc008058ba0 42 D0318 17:09:39.298965 434971 usertrap_amd64.go:225] [ 2619( 90): 2619( 90)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.300019 434971 task_exit.go:204] [ 2619( 90): 2619( 90)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.300106 434971 task_exit.go:204] [ 2619( 90): 2619( 90)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.300142 434971 task_signals.go:204] [ 2619( 90): 2625( 91)] Signal 9, PID: 2619, TID: 2625, fault addr: 0x0: terminating thread group D0318 17:09:39.300170 434971 task_exit.go:204] [ 2619( 90): 2625( 91)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.300293 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.300325 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 37 D0318 17:09:39.300471 434971 task_exit.go:204] [ 2619( 90): 2625( 91)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.300510 434971 task_exit.go:204] [ 2619( 90): 2625( 91)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.300505 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.300520 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.301500 434971 task_exit.go:204] [ 2619( 90): 2619( 90)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) D0318 17:09:39.303353 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.303383 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 38 D0318 17:09:39.303395 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.309342 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.309401 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 39 D0318 17:09:39.309420 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.313665 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.313707 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 36 D0318 17:09:39.313860 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.314285 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.314305 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 37 D0318 17:09:39.314439 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.315394 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.315428 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 37 D0318 17:09:39.315439 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.318484 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.318527 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 40 D0318 17:09:39.318538 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.318840 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.318870 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 41 D0318 17:09:39.318884 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.318978 434971 usertrap_amd64.go:212] [ 2623( 606): 2628( 607)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.319009 434971 usertrap_amd64.go:122] [ 2623( 606): 2628( 607)] Allocate a new trap: 0xc008058bd0 42 D0318 17:09:39.319021 434971 usertrap_amd64.go:225] [ 2623( 606): 2628( 607)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.319907 434971 usertrap_amd64.go:212] [ 2623( 606): 2623( 606)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.319942 434971 usertrap_amd64.go:122] [ 2623( 606): 2623( 606)] Allocate a new trap: 0xc008058bd0 43 D0318 17:09:39.319947 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.319957 434971 usertrap_amd64.go:225] [ 2623( 606): 2623( 606)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.319964 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 38 D0318 17:09:39.319975 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.320728 434971 task_exit.go:204] [ 2623( 606): 2623( 606)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.320895 434971 task_exit.go:204] [ 2623( 606): 2623( 606)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.320949 434971 task_signals.go:204] [ 2623( 606): 2628( 607)] Signal 9, PID: 2623, TID: 2628, fault addr: 0x0: terminating thread group D0318 17:09:39.320968 434971 task_exit.go:204] [ 2623( 606): 2628( 607)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.321340 434971 task_exit.go:204] [ 2623( 606): 2628( 607)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.321358 434971 task_exit.go:204] [ 2623( 606): 2628( 607)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.321371 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.322415 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.322449 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 38 D0318 17:09:39.322464 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.322617 434971 task_exit.go:204] [ 2623( 606): 2623( 606)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) dup2(r1, r0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) D0318 17:09:39.326403 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.326432 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 39 D0318 17:09:39.326443 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.326463 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.326481 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 39 D0318 17:09:39.326491 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.326672 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.326766 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 40 D0318 17:09:39.326839 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.327017 434971 usertrap_amd64.go:212] [ 2626( 92): 2629( 93)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.327048 434971 usertrap_amd64.go:122] [ 2626( 92): 2629( 93)] Allocate a new trap: 0xc0081619e0 41 D0318 17:09:39.327059 434971 usertrap_amd64.go:225] [ 2626( 92): 2629( 93)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.327562 434971 usertrap_amd64.go:212] [ 2626( 92): 2626( 92)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.327598 434971 usertrap_amd64.go:122] [ 2626( 92): 2626( 92)] Allocate a new trap: 0xc0081619e0 42 D0318 17:09:39.327633 434971 usertrap_amd64.go:225] [ 2626( 92): 2626( 92)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.330077 434971 task_exit.go:204] [ 2626( 92): 2626( 92)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.330122 434971 task_exit.go:204] [ 2626( 92): 2626( 92)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.330145 434971 task_signals.go:204] [ 2626( 92): 2629( 93)] Signal 9, PID: 2626, TID: 2629, fault addr: 0x0: terminating thread group D0318 17:09:39.330158 434971 task_exit.go:204] [ 2626( 92): 2629( 93)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.330443 434971 task_exit.go:204] [ 2626( 92): 2629( 93)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.330475 434971 task_exit.go:204] [ 2626( 92): 2629( 93)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.330492 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.330803 434971 task_exit.go:204] [ 2626( 92): 2626( 92)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) D0318 17:09:39.333749 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.333827 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 37 D0318 17:09:39.334003 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.335335 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.335377 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 38 D0318 17:09:39.335398 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.335701 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.335750 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 40 D0318 17:09:39.335764 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.336339 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.336381 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 41 D0318 17:09:39.336398 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.336489 434971 usertrap_amd64.go:212] [ 2627( 709): 2631( 710)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.336522 434971 usertrap_amd64.go:122] [ 2627( 709): 2631( 710)] Allocate a new trap: 0xc001596300 42 D0318 17:09:39.336538 434971 usertrap_amd64.go:225] [ 2627( 709): 2631( 710)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.339743 434971 usertrap_amd64.go:212] [ 2627( 709): 2627( 709)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.339877 434971 usertrap_amd64.go:122] [ 2627( 709): 2627( 709)] Allocate a new trap: 0xc001596300 43 D0318 17:09:39.339912 434971 usertrap_amd64.go:225] [ 2627( 709): 2627( 709)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.340768 434971 task_exit.go:204] [ 2627( 709): 2627( 709)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.340837 434971 task_exit.go:204] [ 2627( 709): 2627( 709)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.340868 434971 task_signals.go:204] [ 2627( 709): 2631( 710)] Signal 9, PID: 2627, TID: 2631, fault addr: 0x0: terminating thread group D0318 17:09:39.340900 434971 task_exit.go:204] [ 2627( 709): 2631( 710)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.341254 434971 task_exit.go:204] [ 2627( 709): 2631( 710)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.341289 434971 task_exit.go:204] [ 2627( 709): 2631( 710)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.341311 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.341838 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.341877 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 39 D0318 17:09:39.341892 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.342388 434971 task_exit.go:204] [ 2627( 709): 2627( 709)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002200)={0x50, 0x0, r2}, 0x50) read$FUSE(r0, &(0x7f0000002900)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r3}, 0x10) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x40086602, &(0x7f00000021c0)) D0318 17:09:39.343422 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559ca0281ae:sysno 230 D0318 17:09:39.343467 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 42 D0318 17:09:39.343481 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559ca0281ae trap addr 66d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.345377 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.345502 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 36 D0318 17:09:39.345622 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.346788 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.346813 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 40 D0318 17:09:39.346830 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.347039 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.347099 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 41 D0318 17:09:39.347117 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.347339 434971 usertrap_amd64.go:212] [ 2630( 608): 2634( 609)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.347389 434971 usertrap_amd64.go:122] [ 2630( 608): 2634( 609)] Allocate a new trap: 0xc0083c8720 42 D0318 17:09:39.347403 434971 usertrap_amd64.go:225] [ 2630( 608): 2634( 609)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.348650 434971 usertrap_amd64.go:212] [ 2630( 608): 2630( 608)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.348679 434971 usertrap_amd64.go:122] [ 2630( 608): 2630( 608)] Allocate a new trap: 0xc0083c8720 43 D0318 17:09:39.348697 434971 usertrap_amd64.go:225] [ 2630( 608): 2630( 608)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.348822 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.348862 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 37 D0318 17:09:39.348879 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.349969 434971 task_exit.go:204] [ 2630( 608): 2630( 608)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.350025 434971 task_exit.go:204] [ 2630( 608): 2630( 608)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.350053 434971 task_signals.go:204] [ 2630( 608): 2634( 609)] Signal 9, PID: 2630, TID: 2634, fault addr: 0x0: terminating thread group D0318 17:09:39.350067 434971 task_exit.go:204] [ 2630( 608): 2634( 609)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.350461 434971 task_exit.go:204] [ 2630( 608): 2634( 609)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.350504 434971 task_exit.go:204] [ 2630( 608): 2634( 609)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.350518 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.350712 434971 task_exit.go:204] [ 2630( 608): 2630( 608)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) D0318 17:09:39.354246 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.354310 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 38 D0318 17:09:39.354336 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.356552 434971 usertrap_amd64.go:212] [ 2621( 44): 2621( 44)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.356680 434971 usertrap_amd64.go:122] [ 2621( 44): 2621( 44)] Allocate a new trap: 0xc0084c3050 43 D0318 17:09:39.356721 434971 usertrap_amd64.go:225] [ 2621( 44): 2621( 44)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 17:09:39.356941 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.357017 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 37 D0318 17:09:39.357232 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.359758 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.359827 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 39 D0318 17:09:39.359849 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.360186 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.360229 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 40 D0318 17:09:39.360252 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.360434 434971 usertrap_amd64.go:212] [ 2632( 94): 2635( 95)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.360485 434971 usertrap_amd64.go:122] [ 2632( 94): 2635( 95)] Allocate a new trap: 0xc0084c3110 41 D0318 17:09:39.360507 434971 usertrap_amd64.go:225] [ 2632( 94): 2635( 95)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.361329 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.361375 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 38 D0318 17:09:39.361392 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.361484 434971 usertrap_amd64.go:212] [ 2632( 94): 2632( 94)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.361518 434971 usertrap_amd64.go:122] [ 2632( 94): 2632( 94)] Allocate a new trap: 0xc0084c3110 42 D0318 17:09:39.361844 434971 usertrap_amd64.go:225] [ 2632( 94): 2632( 94)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.362438 434971 task_exit.go:204] [ 2632( 94): 2632( 94)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.362505 434971 task_exit.go:204] [ 2632( 94): 2632( 94)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.362539 434971 task_signals.go:204] [ 2632( 94): 2635( 95)] Signal 9, PID: 2632, TID: 2635, fault addr: 0x0: terminating thread group D0318 17:09:39.362565 434971 task_exit.go:204] [ 2632( 94): 2635( 95)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.362890 434971 task_exit.go:204] [ 2632( 94): 2635( 95)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.362916 434971 task_exit.go:204] [ 2632( 94): 2635( 95)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.362935 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.363393 434971 task_exit.go:204] [ 2632( 94): 2632( 94)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) write$FUSE_POLL(r1, 0x0, 0x0) D0318 17:09:39.379549 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.379583 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 37 D0318 17:09:39.379634 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.379651 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 39 D0318 17:09:39.379668 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.379753 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.380080 434971 task_exit.go:204] [ 2621( 44): 2621( 44)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.380161 434971 task_exit.go:204] [ 2621( 44): 2621( 44)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.380201 434971 task_signals.go:204] [ 2621( 44): 2624( 45)] Signal 9, PID: 2621, TID: 2624, fault addr: 0x0: terminating thread group D0318 17:09:39.380259 434971 task_exit.go:204] [ 2621( 44): 2624( 45)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.381173 434971 task_exit.go:204] [ 2621( 44): 2624( 45)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.381215 434971 task_exit.go:204] [ 2621( 44): 2624( 45)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.381236 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.381730 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.381767 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 38 D0318 17:09:39.381792 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.382362 434971 task_exit.go:204] [ 2621( 44): 2621( 44)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0xa0402, 0x0) write$binfmt_elf32(r0, 0x0, 0xa05) D0318 17:09:39.388304 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.388348 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 40 D0318 17:09:39.388375 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.388851 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.388887 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 41 D0318 17:09:39.388914 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.389003 434971 usertrap_amd64.go:212] [ 2633( 711): 2638( 712)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.389057 434971 usertrap_amd64.go:122] [ 2633( 711): 2638( 712)] Allocate a new trap: 0xc0084c3140 42 D0318 17:09:39.389346 434971 usertrap_amd64.go:225] [ 2633( 711): 2638( 712)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.390754 434971 usertrap_amd64.go:212] [ 2633( 711): 2633( 711)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.390792 434971 usertrap_amd64.go:122] [ 2633( 711): 2633( 711)] Allocate a new trap: 0xc0084c3140 43 D0318 17:09:39.390806 434971 usertrap_amd64.go:225] [ 2633( 711): 2633( 711)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.391376 434971 task_exit.go:204] [ 2633( 711): 2633( 711)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.391431 434971 task_exit.go:204] [ 2633( 711): 2633( 711)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.391481 434971 task_signals.go:204] [ 2633( 711): 2638( 712)] Signal 9, PID: 2633, TID: 2638, fault addr: 0x0: terminating thread group D0318 17:09:39.391499 434971 task_exit.go:204] [ 2633( 711): 2638( 712)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.391927 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.391964 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 36 D0318 17:09:39.392040 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.392307 434971 task_exit.go:204] [ 2633( 711): 2638( 712)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.392332 434971 task_exit.go:204] [ 2633( 711): 2638( 712)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.392347 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.393283 434971 task_exit.go:204] [ 2633( 711): 2633( 711)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = dup3(r1, r2, 0x0) dup3(r3, r0, 0x0) D0318 17:09:39.396139 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.396250 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 37 D0318 17:09:39.396287 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.397638 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.397676 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 39 D0318 17:09:39.397691 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.400582 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.400601 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 40 D0318 17:09:39.400623 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.400908 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.400939 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 41 D0318 17:09:39.400976 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.401201 434971 usertrap_amd64.go:212] [ 2636( 610): 2639( 611)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.401232 434971 usertrap_amd64.go:122] [ 2636( 610): 2639( 611)] Allocate a new trap: 0xc0011953b0 42 D0318 17:09:39.401242 434971 usertrap_amd64.go:225] [ 2636( 610): 2639( 611)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.402150 434971 usertrap_amd64.go:212] [ 2636( 610): 2636( 610)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.402181 434971 usertrap_amd64.go:122] [ 2636( 610): 2636( 610)] Allocate a new trap: 0xc0011953b0 43 D0318 17:09:39.402191 434971 usertrap_amd64.go:225] [ 2636( 610): 2636( 610)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.402512 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.402530 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 38 D0318 17:09:39.402544 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.403161 434971 task_exit.go:204] [ 2636( 610): 2636( 610)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.403288 434971 task_exit.go:204] [ 2636( 610): 2636( 610)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.403368 434971 task_signals.go:204] [ 2636( 610): 2639( 611)] Signal 9, PID: 2636, TID: 2639, fault addr: 0x0: terminating thread group D0318 17:09:39.403690 434971 task_exit.go:204] [ 2636( 610): 2639( 611)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.404293 434971 task_exit.go:204] [ 2636( 610): 2639( 611)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.404410 434971 task_exit.go:204] [ 2636( 610): 2639( 611)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.404551 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.405876 434971 task_exit.go:204] [ 2636( 610): 2636( 610)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x891b, &(0x7f0000000000)) D0318 17:09:39.407398 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.407416 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 39 D0318 17:09:39.407426 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.407780 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.407823 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 40 D0318 17:09:39.407901 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.407984 434971 usertrap_amd64.go:212] [ 2637( 96): 2641( 97)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.408016 434971 usertrap_amd64.go:122] [ 2637( 96): 2641( 97)] Allocate a new trap: 0xc001124480 41 D0318 17:09:39.408061 434971 usertrap_amd64.go:225] [ 2637( 96): 2641( 97)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.411288 434971 usertrap_amd64.go:212] [ 2637( 96): 2637( 96)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.411394 434971 usertrap_amd64.go:122] [ 2637( 96): 2637( 96)] Allocate a new trap: 0xc001124480 42 D0318 17:09:39.411416 434971 usertrap_amd64.go:225] [ 2637( 96): 2637( 96)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.411416 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.411438 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 37 D0318 17:09:39.411519 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.412671 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.412687 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 38 D0318 17:09:39.412699 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.413691 434971 task_exit.go:204] [ 2637( 96): 2637( 96)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.413787 434971 task_exit.go:204] [ 2637( 96): 2637( 96)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.413847 434971 task_signals.go:204] [ 2637( 96): 2641( 97)] Signal 9, PID: 2637, TID: 2641, fault addr: 0x0: terminating thread group D0318 17:09:39.413939 434971 task_exit.go:204] [ 2637( 96): 2641( 97)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.414286 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.414370 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 36 D0318 17:09:39.414503 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.414842 434971 task_exit.go:204] [ 2637( 96): 2641( 97)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.414882 434971 task_exit.go:204] [ 2637( 96): 2641( 97)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.414894 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.415550 434971 task_exit.go:204] [ 2637( 96): 2637( 96)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x891c, &(0x7f0000000000)) D0318 17:09:39.417061 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.417148 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 37 D0318 17:09:39.417221 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.419032 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.419058 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 39 D0318 17:09:39.419075 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.422383 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.422470 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 40 D0318 17:09:39.422573 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.422889 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.422919 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 41 D0318 17:09:39.422948 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.423066 434971 usertrap_amd64.go:212] [ 2640( 713): 2645( 714)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.423183 434971 usertrap_amd64.go:122] [ 2640( 713): 2645( 714)] Allocate a new trap: 0xc009098030 42 D0318 17:09:39.423256 434971 usertrap_amd64.go:225] [ 2640( 713): 2645( 714)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.424347 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.424384 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 37 D0318 17:09:39.424514 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.425938 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.425969 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 38 D0318 17:09:39.425981 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.425960 434971 usertrap_amd64.go:212] [ 2640( 713): 2640( 713)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.427438 434971 usertrap_amd64.go:122] [ 2640( 713): 2640( 713)] Allocate a new trap: 0xc009098030 43 D0318 17:09:39.427454 434971 usertrap_amd64.go:225] [ 2640( 713): 2640( 713)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.428615 434971 task_exit.go:204] [ 2640( 713): 2640( 713)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.428678 434971 task_exit.go:204] [ 2640( 713): 2640( 713)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.428804 434971 task_signals.go:204] [ 2640( 713): 2645( 714)] Signal 9, PID: 2640, TID: 2645, fault addr: 0x0: terminating thread group D0318 17:09:39.428966 434971 task_exit.go:204] [ 2640( 713): 2645( 714)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.429416 434971 task_exit.go:204] [ 2640( 713): 2645( 714)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.429449 434971 task_exit.go:204] [ 2640( 713): 2645( 714)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.429472 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.430411 434971 task_exit.go:204] [ 2640( 713): 2640( 713)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x2}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) D0318 17:09:39.431941 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.431991 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 39 D0318 17:09:39.432006 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.432788 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.432869 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 38 D0318 17:09:39.432888 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.436781 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.436820 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 39 D0318 17:09:39.436835 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.437112 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.437133 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.437141 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 40 D0318 17:09:39.437147 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 40 D0318 17:09:39.437152 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.437155 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.437652 434971 usertrap_amd64.go:212] [ 2642( 46): 2646( 47)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.437691 434971 usertrap_amd64.go:122] [ 2642( 46): 2646( 47)] Allocate a new trap: 0xc000b1d020 41 D0318 17:09:39.437704 434971 usertrap_amd64.go:225] [ 2642( 46): 2646( 47)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.437738 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.437746 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 41 D0318 17:09:39.437765 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.437966 434971 usertrap_amd64.go:212] [ 2643( 612): 2647( 613)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.437990 434971 usertrap_amd64.go:122] [ 2643( 612): 2647( 613)] Allocate a new trap: 0xc0013bbb90 42 D0318 17:09:39.438007 434971 usertrap_amd64.go:225] [ 2643( 612): 2647( 613)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.438700 434971 usertrap_amd64.go:212] [ 2642( 46): 2642( 46)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.438719 434971 usertrap_amd64.go:122] [ 2642( 46): 2642( 46)] Allocate a new trap: 0xc000b1d020 42 D0318 17:09:39.438728 434971 usertrap_amd64.go:225] [ 2642( 46): 2642( 46)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.438993 434971 usertrap_amd64.go:212] [ 2643( 612): 2643( 612)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.439008 434971 usertrap_amd64.go:122] [ 2643( 612): 2643( 612)] Allocate a new trap: 0xc0013bbb90 43 D0318 17:09:39.439016 434971 usertrap_amd64.go:225] [ 2643( 612): 2643( 612)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.440303 434971 task_exit.go:204] [ 2642( 46): 2642( 46)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.440352 434971 task_exit.go:204] [ 2642( 46): 2642( 46)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.440385 434971 task_signals.go:204] [ 2642( 46): 2646( 47)] Signal 9, PID: 2642, TID: 2646, fault addr: 0x0: terminating thread group D0318 17:09:39.440410 434971 task_exit.go:204] [ 2642( 46): 2646( 47)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.440721 434971 task_exit.go:204] [ 2642( 46): 2646( 47)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.440801 434971 task_exit.go:204] [ 2642( 46): 2646( 47)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.440881 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.441616 434971 task_exit.go:204] [ 2643( 612): 2643( 612)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.441681 434971 task_exit.go:204] [ 2643( 612): 2643( 612)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.441709 434971 task_signals.go:204] [ 2643( 612): 2647( 613)] Signal 9, PID: 2643, TID: 2647, fault addr: 0x0: terminating thread group D0318 17:09:39.441725 434971 task_exit.go:204] [ 2643( 612): 2647( 613)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.442008 434971 task_exit.go:204] [ 2642( 46): 2642( 46)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.442276 434971 task_exit.go:204] [ 2643( 612): 2647( 613)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.442305 434971 task_exit.go:204] [ 2643( 612): 2647( 613)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.442314 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.442544 434971 task_exit.go:204] [ 2643( 612): 2643( 612)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff]) setresgid(0x0, 0xffffffffffffffff, r0) 17:09:39 executing program 2: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180)) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, 0x0) D0318 17:09:39.445000 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.445305 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 37 D0318 17:09:39.445555 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.446996 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.447029 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 36 D0318 17:09:39.447262 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.447329 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.447348 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 38 D0318 17:09:39.447362 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.448810 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.448841 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 37 D0318 17:09:39.448851 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.452129 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.452167 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 37 D0318 17:09:39.452214 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.452336 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 36 D0318 17:09:39.452233 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.452536 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.453403 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.453468 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 39 D0318 17:09:39.453500 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.453726 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.453758 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 37 D0318 17:09:39.453780 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.455131 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.455167 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 38 D0318 17:09:39.455178 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.455558 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.455597 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 38 D0318 17:09:39.455639 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.457320 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.457343 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 40 D0318 17:09:39.457357 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.457549 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.457586 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 41 D0318 17:09:39.457597 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.457977 434971 usertrap_amd64.go:212] [ 2648( 715): 2651( 716)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.458071 434971 usertrap_amd64.go:122] [ 2648( 715): 2651( 716)] Allocate a new trap: 0xc008161a10 42 D0318 17:09:39.458173 434971 usertrap_amd64.go:225] [ 2648( 715): 2651( 716)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.458556 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.458600 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 38 D0318 17:09:39.458615 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.459061 434971 usertrap_amd64.go:212] [ 2648( 715): 2648( 715)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.459110 434971 usertrap_amd64.go:122] [ 2648( 715): 2648( 715)] Allocate a new trap: 0xc008161a10 43 D0318 17:09:39.459122 434971 usertrap_amd64.go:225] [ 2648( 715): 2648( 715)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.459839 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.459868 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 39 D0318 17:09:39.459877 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.460269 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.460296 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 39 D0318 17:09:39.460307 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.460308 434971 usertrap_amd64.go:212] [ 2644( 98): 2652( 99)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.460328 434971 usertrap_amd64.go:122] [ 2644( 98): 2652( 99)] Allocate a new trap: 0xc001596330 40 D0318 17:09:39.460339 434971 usertrap_amd64.go:225] [ 2644( 98): 2652( 99)] Apply the binary patch addr 55857d8bf320 trap addr 65c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.460439 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.460467 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 41 D0318 17:09:39.460477 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d8bfc10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.460667 434971 task_exit.go:204] [ 2648( 715): 2648( 715)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.460714 434971 task_exit.go:204] [ 2648( 715): 2648( 715)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.460797 434971 task_signals.go:204] [ 2648( 715): 2651( 716)] Signal 9, PID: 2648, TID: 2651, fault addr: 0x0: terminating thread group D0318 17:09:39.460837 434971 task_exit.go:204] [ 2648( 715): 2651( 716)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.461251 434971 task_exit.go:204] [ 2648( 715): 2651( 716)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.461283 434971 task_exit.go:204] [ 2648( 715): 2651( 716)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.461302 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.461438 434971 usertrap_amd64.go:212] [ 2644( 98): 2644( 98)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.461473 434971 usertrap_amd64.go:122] [ 2644( 98): 2644( 98)] Allocate a new trap: 0xc001596330 42 D0318 17:09:39.461490 434971 usertrap_amd64.go:225] [ 2644( 98): 2644( 98)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.462034 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.462104 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 39 D0318 17:09:39.462116 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.462259 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.462303 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 40 D0318 17:09:39.462315 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.462425 434971 task_exit.go:204] [ 2648( 715): 2648( 715)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.462798 434971 usertrap_amd64.go:212] [ 2650( 48): 2653( 49)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.462829 434971 usertrap_amd64.go:122] [ 2650( 48): 2653( 49)] Allocate a new trap: 0xc000b1d050 41 D0318 17:09:39.462841 434971 usertrap_amd64.go:225] [ 2650( 48): 2653( 49)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) 17:09:39 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) D0318 17:09:39.463198 434971 usertrap_amd64.go:212] [ 2650( 48): 2650( 48)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.463242 434971 usertrap_amd64.go:122] [ 2650( 48): 2650( 48)] Allocate a new trap: 0xc000b1d050 42 D0318 17:09:39.463254 434971 usertrap_amd64.go:225] [ 2650( 48): 2650( 48)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.463520 434971 task_exit.go:204] [ 2644( 98): 2644( 98)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.463566 434971 task_exit.go:204] [ 2644( 98): 2644( 98)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.463629 434971 task_signals.go:204] [ 2644( 98): 2652( 99)] Signal 9, PID: 2644, TID: 2652, fault addr: 0x0: terminating thread group D0318 17:09:39.463647 434971 task_exit.go:204] [ 2644( 98): 2652( 99)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.463869 434971 task_exit.go:204] [ 2644( 98): 2652( 99)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.463901 434971 task_exit.go:204] [ 2644( 98): 2652( 99)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.463924 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.464226 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.464317 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 40 D0318 17:09:39.464352 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.464381 434971 task_exit.go:204] [ 2650( 48): 2650( 48)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.464488 434971 task_signals.go:204] [ 2650( 48): 2653( 49)] Signal 9, PID: 2650, TID: 2653, fault addr: 0x0: terminating thread group D0318 17:09:39.464528 434971 task_exit.go:204] [ 2650( 48): 2650( 48)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.464593 434971 task_exit.go:204] [ 2650( 48): 2653( 49)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.464818 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.464850 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 41 D0318 17:09:39.464861 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.465023 434971 task_exit.go:204] [ 2650( 48): 2653( 49)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.465061 434971 task_exit.go:204] [ 2650( 48): 2653( 49)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.465075 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.465323 434971 task_exit.go:204] [ 2644( 98): 2644( 98)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.465741 434971 task_exit.go:204] [ 2650( 48): 2650( 48)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8953, &(0x7f0000000000)) D0318 17:09:39.467834 434971 usertrap_amd64.go:212] [ 2649( 614): 2654( 615)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.467890 434971 usertrap_amd64.go:122] [ 2649( 614): 2654( 615)] Allocate a new trap: 0xc0083c87b0 42 D0318 17:09:39.467912 434971 usertrap_amd64.go:225] [ 2649( 614): 2654( 615)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) 17:09:39 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3, &(0x7f0000000ec0)=0x0) io_submit(r1, 0x1, &(0x7f0000001440)=[&(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) D0318 17:09:39.468699 434971 usertrap_amd64.go:212] [ 2649( 614): 2654( 615)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:39.468729 434971 usertrap_amd64.go:122] [ 2649( 614): 2654( 615)] Allocate a new trap: 0xc0083c87b0 43 D0318 17:09:39.468740 434971 usertrap_amd64.go:225] [ 2649( 614): 2654( 615)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.470767 434971 usertrap_amd64.go:212] [ 2649( 614): 2649( 614)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.470790 434971 usertrap_amd64.go:122] [ 2649( 614): 2649( 614)] Allocate a new trap: 0xc0083c87b0 44 D0318 17:09:39.470842 434971 usertrap_amd64.go:225] [ 2649( 614): 2649( 614)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:39.471243 434971 task_exit.go:204] [ 2649( 614): 2649( 614)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.471486 434971 task_exit.go:204] [ 2649( 614): 2649( 614)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.471575 434971 task_signals.go:204] [ 2649( 614): 2654( 615)] Signal 9, PID: 2649, TID: 2654, fault addr: 0x0: terminating thread group D0318 17:09:39.471695 434971 task_exit.go:204] [ 2649( 614): 2654( 615)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.472122 434971 task_exit.go:204] [ 2649( 614): 2654( 615)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.472151 434971 task_exit.go:204] [ 2649( 614): 2654( 615)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.472175 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.473842 434971 task_exit.go:204] [ 2649( 614): 2649( 614)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x8, 0x4) D0318 17:09:39.474728 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.474754 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 37 D0318 17:09:39.474920 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.477816 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.477851 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 38 D0318 17:09:39.477869 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.482145 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.482194 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 37 D0318 17:09:39.482298 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.482363 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.482728 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 36 D0318 17:09:39.482858 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.484212 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.484252 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 39 D0318 17:09:39.484267 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.484687 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.484725 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 37 D0318 17:09:39.484756 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.485442 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.485475 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 38 D0318 17:09:39.485490 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.487448 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.487480 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 40 D0318 17:09:39.487493 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.487810 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.487858 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 41 D0318 17:09:39.487869 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.487997 434971 usertrap_amd64.go:212] [ 2655( 717): 2659( 718)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.488020 434971 usertrap_amd64.go:122] [ 2655( 717): 2659( 718)] Allocate a new trap: 0xc0083c8810 42 D0318 17:09:39.488029 434971 usertrap_amd64.go:225] [ 2655( 717): 2659( 718)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.489147 434971 usertrap_amd64.go:212] [ 2655( 717): 2655( 717)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.489185 434971 usertrap_amd64.go:122] [ 2655( 717): 2655( 717)] Allocate a new trap: 0xc0083c8810 43 D0318 17:09:39.489198 434971 usertrap_amd64.go:225] [ 2655( 717): 2655( 717)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.489863 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.489888 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 38 D0318 17:09:39.489897 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.490396 434971 task_exit.go:204] [ 2655( 717): 2655( 717)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.490602 434971 task_exit.go:204] [ 2655( 717): 2655( 717)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.490713 434971 task_signals.go:204] [ 2655( 717): 2659( 718)] Signal 9, PID: 2655, TID: 2659, fault addr: 0x0: terminating thread group D0318 17:09:39.490770 434971 task_exit.go:204] [ 2655( 717): 2659( 718)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.490932 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.490979 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 39 D0318 17:09:39.490993 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.491215 434971 task_exit.go:204] [ 2655( 717): 2659( 718)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.491255 434971 task_exit.go:204] [ 2655( 717): 2659( 718)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.491269 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.492071 434971 task_exit.go:204] [ 2655( 717): 2655( 717)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) D0318 17:09:39.493746 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.493779 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 36 D0318 17:09:39.493880 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.494043 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.494072 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 39 D0318 17:09:39.494083 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.494275 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.494348 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 40 D0318 17:09:39.494499 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.494550 434971 usertrap_amd64.go:212] [ 2657( 50): 2660( 51)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.494562 434971 usertrap_amd64.go:122] [ 2657( 50): 2660( 51)] Allocate a new trap: 0xc0084c3200 41 D0318 17:09:39.494570 434971 usertrap_amd64.go:225] [ 2657( 50): 2660( 51)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.495016 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.495039 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 40 D0318 17:09:39.495046 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.495344 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.495375 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 41 D0318 17:09:39.495386 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.495484 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.495520 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 37 D0318 17:09:39.495533 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.495701 434971 usertrap_amd64.go:212] [ 2656( 616): 2661( 617)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.495738 434971 usertrap_amd64.go:122] [ 2656( 616): 2661( 617)] Allocate a new trap: 0xc0084c31d0 42 D0318 17:09:39.495754 434971 usertrap_amd64.go:225] [ 2656( 616): 2661( 617)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.496096 434971 usertrap_amd64.go:212] [ 2657( 50): 2657( 50)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.496156 434971 usertrap_amd64.go:122] [ 2657( 50): 2657( 50)] Allocate a new trap: 0xc0084c3200 42 D0318 17:09:39.496168 434971 usertrap_amd64.go:225] [ 2657( 50): 2657( 50)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.497355 434971 usertrap_amd64.go:212] [ 2656( 616): 2656( 616)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.497394 434971 usertrap_amd64.go:122] [ 2656( 616): 2656( 616)] Allocate a new trap: 0xc0084c31d0 43 D0318 17:09:39.497407 434971 usertrap_amd64.go:225] [ 2656( 616): 2656( 616)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.497998 434971 task_exit.go:204] [ 2657( 50): 2657( 50)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.498125 434971 task_exit.go:204] [ 2657( 50): 2657( 50)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.498207 434971 task_signals.go:204] [ 2657( 50): 2660( 51)] Signal 9, PID: 2657, TID: 2660, fault addr: 0x0: terminating thread group D0318 17:09:39.498254 434971 task_exit.go:204] [ 2657( 50): 2660( 51)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.498653 434971 task_exit.go:204] [ 2657( 50): 2660( 51)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.498698 434971 task_exit.go:204] [ 2657( 50): 2660( 51)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.498714 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.499250 434971 task_exit.go:204] [ 2656( 616): 2656( 616)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.499297 434971 task_exit.go:204] [ 2656( 616): 2656( 616)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.499332 434971 task_signals.go:204] [ 2656( 616): 2661( 617)] Signal 9, PID: 2656, TID: 2661, fault addr: 0x0: terminating thread group D0318 17:09:39.499346 434971 task_exit.go:204] [ 2656( 616): 2661( 617)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.499777 434971 task_exit.go:204] [ 2656( 616): 2661( 617)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.499811 434971 task_exit.go:204] [ 2656( 616): 2661( 617)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.499830 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.499953 434971 task_exit.go:204] [ 2657( 50): 2657( 50)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.500137 434971 task_exit.go:204] [ 2656( 616): 2656( 616)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: clock_gettime(0x3, &(0x7f0000000a80)) 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@loopback, r2}, 0x14) D0318 17:09:39.501981 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.502015 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 38 D0318 17:09:39.502032 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.504283 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.504323 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 37 D0318 17:09:39.504474 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.505493 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.505527 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 39 D0318 17:09:39.505537 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.505864 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.505894 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 40 D0318 17:09:39.505903 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.506028 434971 usertrap_amd64.go:212] [ 2658( 100): 2664( 101)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.506108 434971 usertrap_amd64.go:122] [ 2658( 100): 2664( 101)] Allocate a new trap: 0xc009098120 41 D0318 17:09:39.506206 434971 usertrap_amd64.go:225] [ 2658( 100): 2664( 101)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.506672 434971 usertrap_amd64.go:212] [ 2658( 100): 2658( 100)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.506700 434971 usertrap_amd64.go:122] [ 2658( 100): 2658( 100)] Allocate a new trap: 0xc009098120 42 D0318 17:09:39.506709 434971 usertrap_amd64.go:225] [ 2658( 100): 2658( 100)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.507592 434971 task_exit.go:204] [ 2658( 100): 2658( 100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.507671 434971 task_exit.go:204] [ 2658( 100): 2658( 100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.507702 434971 task_signals.go:204] [ 2658( 100): 2664( 101)] Signal 9, PID: 2658, TID: 2664, fault addr: 0x0: terminating thread group D0318 17:09:39.507740 434971 task_exit.go:204] [ 2658( 100): 2664( 101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.508056 434971 task_exit.go:204] [ 2658( 100): 2664( 101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.509816 434971 task_exit.go:204] [ 2658( 100): 2664( 101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.509838 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.508584 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.509923 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 38 D0318 17:09:39.509958 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.509934 434971 task_exit.go:204] [ 2658( 100): 2658( 100)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: mq_open(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0, 0x0) D0318 17:09:39.512462 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.512505 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 36 D0318 17:09:39.512625 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.513713 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.513744 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 37 D0318 17:09:39.513755 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.515062 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.515196 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 39 D0318 17:09:39.515228 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.515149 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.515344 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 37 D0318 17:09:39.515441 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.517794 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.517870 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 40 D0318 17:09:39.517892 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.518133 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.518164 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 41 D0318 17:09:39.518177 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.518252 434971 usertrap_amd64.go:212] [ 2662( 719): 2666( 720)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.518271 434971 usertrap_amd64.go:122] [ 2662( 719): 2666( 720)] Allocate a new trap: 0xc0083c8840 42 D0318 17:09:39.518281 434971 usertrap_amd64.go:225] [ 2662( 719): 2666( 720)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.518807 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.518840 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 38 D0318 17:09:39.518850 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.519087 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.519128 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 38 D0318 17:09:39.519141 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.519390 434971 usertrap_amd64.go:212] [ 2662( 719): 2662( 719)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.519431 434971 usertrap_amd64.go:122] [ 2662( 719): 2662( 719)] Allocate a new trap: 0xc0083c8840 43 D0318 17:09:39.519450 434971 usertrap_amd64.go:225] [ 2662( 719): 2662( 719)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.522098 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.522117 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 39 D0318 17:09:39.522121 434971 task_exit.go:204] [ 2662( 719): 2662( 719)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.522130 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.522189 434971 task_exit.go:204] [ 2662( 719): 2662( 719)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.522218 434971 task_signals.go:204] [ 2662( 719): 2666( 720)] Signal 9, PID: 2662, TID: 2666, fault addr: 0x0: terminating thread group D0318 17:09:39.522236 434971 task_exit.go:204] [ 2662( 719): 2666( 720)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.522580 434971 task_exit.go:204] [ 2662( 719): 2666( 720)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.522600 434971 task_exit.go:204] [ 2662( 719): 2666( 720)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.522612 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.522665 434971 usertrap_amd64.go:212] [ 2663( 52): 2667( 53)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.522754 434971 usertrap_amd64.go:122] [ 2663( 52): 2667( 53)] Allocate a new trap: 0xc000b1d0b0 40 D0318 17:09:39.522834 434971 usertrap_amd64.go:225] [ 2663( 52): 2667( 53)] Apply the binary patch addr 5559c9fd1320 trap addr 66c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.522989 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.523007 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 41 D0318 17:09:39.523020 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559c9fd1c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.523303 434971 task_exit.go:204] [ 2662( 719): 2662( 719)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: mq_open(&(0x7f0000000500)='%}\x00', 0x0, 0x0, &(0x7f0000000540)) D0318 17:09:39.524756 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.524775 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 39 D0318 17:09:39.524787 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.525722 434971 usertrap_amd64.go:212] [ 2663( 52): 2663( 52)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.525746 434971 usertrap_amd64.go:122] [ 2663( 52): 2663( 52)] Allocate a new trap: 0xc000b1d0b0 42 D0318 17:09:39.525761 434971 usertrap_amd64.go:225] [ 2663( 52): 2663( 52)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.527351 434971 task_exit.go:204] [ 2663( 52): 2663( 52)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.527405 434971 task_signals.go:204] [ 2663( 52): 2667( 53)] Signal 9, PID: 2663, TID: 2667, fault addr: 0x0: terminating thread group D0318 17:09:39.527529 434971 task_exit.go:204] [ 2663( 52): 2663( 52)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.527578 434971 task_exit.go:204] [ 2663( 52): 2667( 53)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.527962 434971 task_exit.go:204] [ 2663( 52): 2667( 53)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.527995 434971 task_exit.go:204] [ 2663( 52): 2667( 53)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.528008 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.528122 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.528155 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 40 D0318 17:09:39.528165 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.528333 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.528361 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 41 D0318 17:09:39.528374 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.529292 434971 usertrap_amd64.go:212] [ 2665( 618): 2669( 619)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.529408 434971 usertrap_amd64.go:122] [ 2665( 618): 2669( 619)] Allocate a new trap: 0xc0011244e0 42 D0318 17:09:39.529446 434971 usertrap_amd64.go:225] [ 2665( 618): 2669( 619)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.529483 434971 task_exit.go:204] [ 2663( 52): 2663( 52)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: socketpair(0x36, 0x0, 0x0, &(0x7f0000000000)) D0318 17:09:39.531655 434971 usertrap_amd64.go:212] [ 2665( 618): 2665( 618)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.531692 434971 usertrap_amd64.go:122] [ 2665( 618): 2665( 618)] Allocate a new trap: 0xc0011244e0 43 D0318 17:09:39.531704 434971 usertrap_amd64.go:225] [ 2665( 618): 2665( 618)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.532385 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.532427 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 36 D0318 17:09:39.532582 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.533022 434971 task_exit.go:204] [ 2665( 618): 2665( 618)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.533083 434971 task_signals.go:204] [ 2665( 618): 2669( 619)] Signal 9, PID: 2665, TID: 2669, fault addr: 0x0: terminating thread group D0318 17:09:39.533188 434971 task_exit.go:204] [ 2665( 618): 2665( 618)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.533237 434971 task_exit.go:204] [ 2665( 618): 2669( 619)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.533707 434971 task_exit.go:204] [ 2665( 618): 2669( 619)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.533774 434971 task_exit.go:204] [ 2665( 618): 2669( 619)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.533807 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.534690 434971 task_exit.go:204] [ 2665( 618): 2665( 618)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.535092 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.535125 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 37 D0318 17:09:39.535140 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8953, 0x0) D0318 17:09:39.540480 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.540504 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 37 D0318 17:09:39.540673 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.541507 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.541529 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 38 D0318 17:09:39.541540 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.542092 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.542127 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 38 D0318 17:09:39.542137 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.543080 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.543111 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 37 D0318 17:09:39.543246 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.545110 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.545137 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 39 D0318 17:09:39.545154 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.545120 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.545177 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 38 D0318 17:09:39.545190 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.545503 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.545532 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 40 D0318 17:09:39.545547 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.545825 434971 usertrap_amd64.go:212] [ 2668( 102): 2672( 103)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.545859 434971 usertrap_amd64.go:122] [ 2668( 102): 2672( 103)] Allocate a new trap: 0xc001596390 41 D0318 17:09:39.545869 434971 usertrap_amd64.go:225] [ 2668( 102): 2672( 103)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.546382 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.546457 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 39 D0318 17:09:39.546490 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.546549 434971 usertrap_amd64.go:212] [ 2668( 102): 2668( 102)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.546580 434971 usertrap_amd64.go:122] [ 2668( 102): 2668( 102)] Allocate a new trap: 0xc001596390 42 D0318 17:09:39.546590 434971 usertrap_amd64.go:225] [ 2668( 102): 2668( 102)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.549083 434971 task_exit.go:204] [ 2668( 102): 2668( 102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.549139 434971 task_exit.go:204] [ 2668( 102): 2668( 102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.549175 434971 task_signals.go:204] [ 2668( 102): 2672( 103)] Signal 9, PID: 2668, TID: 2672, fault addr: 0x0: terminating thread group D0318 17:09:39.549204 434971 task_exit.go:204] [ 2668( 102): 2672( 103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.549550 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.549626 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 40 D0318 17:09:39.549661 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.549560 434971 task_exit.go:204] [ 2668( 102): 2672( 103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.549698 434971 task_exit.go:204] [ 2668( 102): 2672( 103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.549714 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.549882 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.549914 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 39 D0318 17:09:39.549926 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.550230 434971 task_exit.go:204] [ 2668( 102): 2668( 102)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.551144 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.551160 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 41 D0318 17:09:39.551170 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x890b, 0x0) D0318 17:09:39.551425 434971 usertrap_amd64.go:212] [ 2670( 721): 2673( 722)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.551463 434971 usertrap_amd64.go:122] [ 2670( 721): 2673( 722)] Allocate a new trap: 0xc0083c8870 42 D0318 17:09:39.551478 434971 usertrap_amd64.go:225] [ 2670( 721): 2673( 722)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.552731 434971 usertrap_amd64.go:212] [ 2670( 721): 2670( 721)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.552762 434971 usertrap_amd64.go:122] [ 2670( 721): 2670( 721)] Allocate a new trap: 0xc0083c8870 43 D0318 17:09:39.552771 434971 usertrap_amd64.go:225] [ 2670( 721): 2670( 721)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.553398 434971 task_exit.go:204] [ 2670( 721): 2670( 721)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.553443 434971 task_exit.go:204] [ 2670( 721): 2670( 721)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.553464 434971 task_signals.go:204] [ 2670( 721): 2673( 722)] Signal 9, PID: 2670, TID: 2673, fault addr: 0x0: terminating thread group D0318 17:09:39.553484 434971 task_exit.go:204] [ 2670( 721): 2673( 722)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.553815 434971 task_exit.go:204] [ 2670( 721): 2673( 722)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.553854 434971 task_exit.go:204] [ 2670( 721): 2673( 722)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.553864 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.554325 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.554364 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 40 D0318 17:09:39.554375 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.554567 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.554618 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 41 D0318 17:09:39.554665 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.554635 434971 task_exit.go:204] [ 2670( 721): 2670( 721)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.555059 434971 usertrap_amd64.go:212] [ 2671( 620): 2675( 621)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.555086 434971 usertrap_amd64.go:122] [ 2671( 620): 2675( 621)] Allocate a new trap: 0xc001124510 42 D0318 17:09:39.555098 434971 usertrap_amd64.go:225] [ 2671( 620): 2675( 621)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) 17:09:39 executing program 3: socketpair(0x2, 0x3, 0xe0, &(0x7f0000000000)) D0318 17:09:39.555675 434971 usertrap_amd64.go:212] [ 2671( 620): 2671( 620)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.555712 434971 usertrap_amd64.go:122] [ 2671( 620): 2671( 620)] Allocate a new trap: 0xc001124510 43 D0318 17:09:39.555724 434971 usertrap_amd64.go:225] [ 2671( 620): 2671( 620)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.556787 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.556822 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 36 D0318 17:09:39.556910 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.557154 434971 task_exit.go:204] [ 2671( 620): 2671( 620)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.557199 434971 task_exit.go:204] [ 2671( 620): 2671( 620)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.557229 434971 task_signals.go:204] [ 2671( 620): 2675( 621)] Signal 9, PID: 2671, TID: 2675, fault addr: 0x0: terminating thread group D0318 17:09:39.557261 434971 task_exit.go:204] [ 2671( 620): 2675( 621)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.557598 434971 task_exit.go:204] [ 2671( 620): 2675( 621)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.557614 434971 task_exit.go:204] [ 2671( 620): 2675( 621)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.557625 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.557674 434971 task_exit.go:204] [ 2671( 620): 2671( 620)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000140)={0x2, 0x0, [{}, {}]}) D0318 17:09:39.559154 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.559173 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 37 D0318 17:09:39.559189 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.563506 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.563546 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 36 D0318 17:09:39.563668 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.564562 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.564580 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 38 D0318 17:09:39.564592 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.565292 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.565323 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 37 D0318 17:09:39.565334 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.565353 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.565370 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 37 D0318 17:09:39.565471 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.566677 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.566780 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 38 D0318 17:09:39.566822 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.567910 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.567928 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 39 D0318 17:09:39.567939 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.568235 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.568314 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 40 D0318 17:09:39.568533 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.568578 434971 usertrap_amd64.go:212] [ 2674( 54): 2678( 55)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.568591 434971 usertrap_amd64.go:122] [ 2674( 54): 2678( 55)] Allocate a new trap: 0xc0084c32f0 41 D0318 17:09:39.568610 434971 usertrap_amd64.go:225] [ 2674( 54): 2678( 55)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.570400 434971 usertrap_amd64.go:212] [ 2674( 54): 2674( 54)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.570420 434971 usertrap_amd64.go:122] [ 2674( 54): 2674( 54)] Allocate a new trap: 0xc0084c32f0 42 D0318 17:09:39.570437 434971 usertrap_amd64.go:225] [ 2674( 54): 2674( 54)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.571474 434971 task_exit.go:204] [ 2674( 54): 2674( 54)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.571537 434971 task_exit.go:204] [ 2674( 54): 2674( 54)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.571568 434971 task_signals.go:204] [ 2674( 54): 2678( 55)] Signal 9, PID: 2674, TID: 2678, fault addr: 0x0: terminating thread group D0318 17:09:39.571678 434971 task_exit.go:204] [ 2674( 54): 2678( 55)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.571913 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.571934 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 38 D0318 17:09:39.571946 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.572384 434971 task_exit.go:204] [ 2674( 54): 2678( 55)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.572471 434971 task_exit.go:204] [ 2674( 54): 2678( 55)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.572619 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.572743 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.572759 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 39 D0318 17:09:39.572769 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.573450 434971 task_exit.go:204] [ 2674( 54): 2674( 54)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x401, 0x0) D0318 17:09:39.576205 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.576247 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 39 D0318 17:09:39.576262 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.576534 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.576584 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 40 D0318 17:09:39.576602 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.576701 434971 usertrap_amd64.go:212] [ 2676( 104): 2680( 105)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.576727 434971 usertrap_amd64.go:122] [ 2676( 104): 2680( 105)] Allocate a new trap: 0xc0084c3320 41 D0318 17:09:39.576741 434971 usertrap_amd64.go:225] [ 2676( 104): 2680( 105)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.577178 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.577213 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 40 D0318 17:09:39.577223 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.577394 434971 usertrap_amd64.go:212] [ 2676( 104): 2676( 104)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.577425 434971 usertrap_amd64.go:122] [ 2676( 104): 2676( 104)] Allocate a new trap: 0xc0084c3320 42 D0318 17:09:39.577436 434971 usertrap_amd64.go:225] [ 2676( 104): 2676( 104)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.577564 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.577610 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 41 D0318 17:09:39.577627 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.577988 434971 usertrap_amd64.go:212] [ 2677( 723): 2681( 724)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.578018 434971 usertrap_amd64.go:122] [ 2677( 723): 2681( 724)] Allocate a new trap: 0xc008058c00 42 D0318 17:09:39.578029 434971 usertrap_amd64.go:225] [ 2677( 723): 2681( 724)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.578371 434971 usertrap_amd64.go:212] [ 2677( 723): 2677( 723)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.578406 434971 usertrap_amd64.go:122] [ 2677( 723): 2677( 723)] Allocate a new trap: 0xc008058c00 43 D0318 17:09:39.578418 434971 usertrap_amd64.go:225] [ 2677( 723): 2677( 723)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.579095 434971 task_exit.go:204] [ 2676( 104): 2676( 104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.579195 434971 task_exit.go:204] [ 2676( 104): 2676( 104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.579220 434971 task_signals.go:204] [ 2676( 104): 2680( 105)] Signal 9, PID: 2676, TID: 2680, fault addr: 0x0: terminating thread group D0318 17:09:39.579235 434971 task_exit.go:204] [ 2676( 104): 2680( 105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.579275 434971 task_exit.go:204] [ 2677( 723): 2677( 723)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.579337 434971 task_exit.go:204] [ 2677( 723): 2677( 723)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.579376 434971 task_signals.go:204] [ 2677( 723): 2681( 724)] Signal 9, PID: 2677, TID: 2681, fault addr: 0x0: terminating thread group D0318 17:09:39.579406 434971 task_exit.go:204] [ 2677( 723): 2681( 724)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.579568 434971 task_exit.go:204] [ 2676( 104): 2680( 105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.579641 434971 task_exit.go:204] [ 2676( 104): 2680( 105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.579656 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.579867 434971 task_exit.go:204] [ 2677( 723): 2681( 724)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.579897 434971 task_exit.go:204] [ 2677( 723): 2681( 724)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.579916 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.581676 434971 task_exit.go:204] [ 2677( 723): 2677( 723)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: io_setup(0x6, &(0x7f0000000100)=0x0) io_submit(r0, 0x1, &(0x7f0000001400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_submit(r0, 0x1, &(0x7f0000001540)=[&(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) D0318 17:09:39.583678 434971 task_exit.go:204] [ 2676( 104): 2676( 104)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5460, 0x0) D0318 17:09:39.587173 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.587205 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 36 D0318 17:09:39.587357 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.588498 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.588513 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 37 D0318 17:09:39.588521 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.591880 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.591997 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 37 D0318 17:09:39.592090 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.592146 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 38 D0318 17:09:39.592164 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.592220 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.592622 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.592718 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 37 D0318 17:09:39.592862 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.593901 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.593987 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 38 D0318 17:09:39.594051 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.594142 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.594179 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 38 D0318 17:09:39.594192 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.595308 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.595341 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 39 D0318 17:09:39.595357 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.595651 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.595739 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 40 D0318 17:09:39.595801 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.595981 434971 usertrap_amd64.go:212] [ 2682( 56): 2684( 57)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.596106 434971 usertrap_amd64.go:122] [ 2682( 56): 2684( 57)] Allocate a new trap: 0xc008058c30 41 D0318 17:09:39.596140 434971 usertrap_amd64.go:225] [ 2682( 56): 2684( 57)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.597047 434971 usertrap_amd64.go:212] [ 2682( 56): 2682( 56)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.597077 434971 usertrap_amd64.go:122] [ 2682( 56): 2682( 56)] Allocate a new trap: 0xc008058c30 42 D0318 17:09:39.597092 434971 usertrap_amd64.go:225] [ 2682( 56): 2682( 56)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.597910 434971 task_exit.go:204] [ 2682( 56): 2682( 56)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.597969 434971 task_exit.go:204] [ 2682( 56): 2682( 56)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.598047 434971 task_signals.go:204] [ 2682( 56): 2684( 57)] Signal 9, PID: 2682, TID: 2684, fault addr: 0x0: terminating thread group D0318 17:09:39.598126 434971 task_exit.go:204] [ 2682( 56): 2684( 57)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.598489 434971 task_exit.go:204] [ 2682( 56): 2684( 57)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.598520 434971 task_exit.go:204] [ 2682( 56): 2684( 57)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.598532 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.598811 434971 task_exit.go:204] [ 2682( 56): 2682( 56)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.599115 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.599153 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 39 D0318 17:09:39.599170 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x89a1, &(0x7f0000000000)) D0318 17:09:39.602151 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.602887 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 39 D0318 17:09:39.602936 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.604258 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.604294 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 40 D0318 17:09:39.604307 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.604905 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.604934 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 41 D0318 17:09:39.604946 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.604968 434971 usertrap_amd64.go:212] [ 2683( 725): 2686( 726)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.604974 434971 usertrap_amd64.go:122] [ 2683( 725): 2686( 726)] Allocate a new trap: 0xc0013bbbf0 42 D0318 17:09:39.604981 434971 usertrap_amd64.go:225] [ 2683( 725): 2686( 726)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.605286 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.605302 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 36 D0318 17:09:39.605425 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.605928 434971 usertrap_amd64.go:212] [ 2683( 725): 2683( 725)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.605963 434971 usertrap_amd64.go:122] [ 2683( 725): 2683( 725)] Allocate a new trap: 0xc0013bbbf0 43 D0318 17:09:39.605978 434971 usertrap_amd64.go:225] [ 2683( 725): 2683( 725)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.606345 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.606375 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 40 D0318 17:09:39.606389 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.606601 434971 task_exit.go:204] [ 2683( 725): 2683( 725)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.606723 434971 task_signals.go:204] [ 2683( 725): 2686( 726)] Signal 9, PID: 2683, TID: 2686, fault addr: 0x0: terminating thread group D0318 17:09:39.606750 434971 task_exit.go:204] [ 2683( 725): 2683( 725)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.606741 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.606773 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 41 D0318 17:09:39.606779 434971 task_exit.go:204] [ 2683( 725): 2686( 726)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.606786 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.606836 434971 usertrap_amd64.go:212] [ 2679( 622): 2687( 623)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.606898 434971 usertrap_amd64.go:122] [ 2679( 622): 2687( 623)] Allocate a new trap: 0xc008161ad0 42 D0318 17:09:39.606915 434971 usertrap_amd64.go:225] [ 2679( 622): 2687( 623)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.607260 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.607300 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 37 D0318 17:09:39.607314 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.607264 434971 task_exit.go:204] [ 2683( 725): 2686( 726)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.607510 434971 task_exit.go:204] [ 2683( 725): 2686( 726)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.607529 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.607737 434971 task_exit.go:204] [ 2683( 725): 2683( 725)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: io_setup(0x3, &(0x7f0000000ec0)=0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[0x0]) D0318 17:09:39.609094 434971 usertrap_amd64.go:212] [ 2679( 622): 2679( 622)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.609112 434971 usertrap_amd64.go:122] [ 2679( 622): 2679( 622)] Allocate a new trap: 0xc008161ad0 43 D0318 17:09:39.609123 434971 usertrap_amd64.go:225] [ 2679( 622): 2679( 622)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.610926 434971 task_exit.go:204] [ 2679( 622): 2679( 622)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.610989 434971 task_signals.go:204] [ 2679( 622): 2687( 623)] Signal 9, PID: 2679, TID: 2687, fault addr: 0x0: terminating thread group D0318 17:09:39.611026 434971 task_exit.go:204] [ 2679( 622): 2679( 622)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.611041 434971 task_exit.go:204] [ 2679( 622): 2687( 623)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.612101 434971 task_exit.go:204] [ 2679( 622): 2687( 623)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.612146 434971 task_exit.go:204] [ 2679( 622): 2687( 623)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.612158 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.612355 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.612388 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 38 D0318 17:09:39.612401 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.613267 434971 task_exit.go:204] [ 2679( 622): 2679( 622)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'syztnl0\x00', 0x0}) D0318 17:09:39.615568 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.615647 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 37 D0318 17:09:39.615787 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.616689 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.616719 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 39 D0318 17:09:39.616729 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.617110 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.617202 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 40 D0318 17:09:39.617275 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.617286 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.617398 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 38 D0318 17:09:39.617417 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.617457 434971 usertrap_amd64.go:212] [ 2685( 58): 2690( 59)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.617486 434971 usertrap_amd64.go:122] [ 2685( 58): 2690( 59)] Allocate a new trap: 0xc000b1d0e0 41 D0318 17:09:39.617497 434971 usertrap_amd64.go:225] [ 2685( 58): 2690( 59)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.618606 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.618622 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 36 D0318 17:09:39.618702 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.618904 434971 usertrap_amd64.go:212] [ 2685( 58): 2685( 58)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.618940 434971 usertrap_amd64.go:122] [ 2685( 58): 2685( 58)] Allocate a new trap: 0xc000b1d0e0 42 D0318 17:09:39.618955 434971 usertrap_amd64.go:225] [ 2685( 58): 2685( 58)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.620239 434971 task_exit.go:204] [ 2685( 58): 2685( 58)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.620288 434971 task_exit.go:204] [ 2685( 58): 2685( 58)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.620321 434971 task_signals.go:204] [ 2685( 58): 2690( 59)] Signal 9, PID: 2685, TID: 2690, fault addr: 0x0: terminating thread group D0318 17:09:39.620352 434971 task_exit.go:204] [ 2685( 58): 2690( 59)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.620502 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.620519 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 37 D0318 17:09:39.620531 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.620816 434971 task_exit.go:204] [ 2685( 58): 2690( 59)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.620927 434971 task_exit.go:204] [ 2685( 58): 2690( 59)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.620981 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.621088 434971 task_exit.go:204] [ 2685( 58): 2685( 58)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: io_setup(0x0, &(0x7f0000000e80)) D0318 17:09:39.622110 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.622140 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 39 D0318 17:09:39.622152 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.625316 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.625340 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 40 D0318 17:09:39.625353 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.625473 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.625498 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 41 D0318 17:09:39.625506 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.625745 434971 usertrap_amd64.go:212] [ 2688( 727): 2693( 728)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.625781 434971 usertrap_amd64.go:122] [ 2688( 727): 2693( 728)] Allocate a new trap: 0xc009098150 42 D0318 17:09:39.625794 434971 usertrap_amd64.go:225] [ 2688( 727): 2693( 728)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.626590 434971 usertrap_amd64.go:212] [ 2688( 727): 2688( 727)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.626676 434971 usertrap_amd64.go:122] [ 2688( 727): 2688( 727)] Allocate a new trap: 0xc009098150 43 D0318 17:09:39.626709 434971 usertrap_amd64.go:225] [ 2688( 727): 2688( 727)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.626865 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.626998 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 38 D0318 17:09:39.627015 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.628435 434971 task_exit.go:204] [ 2688( 727): 2688( 727)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.628491 434971 task_exit.go:204] [ 2688( 727): 2688( 727)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.628533 434971 task_signals.go:204] [ 2688( 727): 2693( 728)] Signal 9, PID: 2688, TID: 2693, fault addr: 0x0: terminating thread group D0318 17:09:39.628565 434971 task_exit.go:204] [ 2688( 727): 2693( 728)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.629098 434971 task_exit.go:204] [ 2688( 727): 2693( 728)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.629139 434971 task_exit.go:204] [ 2688( 727): 2693( 728)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.629154 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.629214 434971 task_exit.go:204] [ 2688( 727): 2688( 727)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.629580 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.629710 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 36 17:09:39 executing program 3: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000140)={0x2, 0x0, [{}, {0x0, 0x9}]}) D0318 17:09:39.630085 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.630672 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.630709 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 39 D0318 17:09:39.630723 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.630891 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.630924 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 40 D0318 17:09:39.630937 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.631020 434971 usertrap_amd64.go:212] [ 2689( 106): 2694( 107)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.631050 434971 usertrap_amd64.go:122] [ 2689( 106): 2694( 107)] Allocate a new trap: 0xc000d15aa0 41 D0318 17:09:39.631061 434971 usertrap_amd64.go:225] [ 2689( 106): 2694( 107)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.631258 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.631289 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 37 D0318 17:09:39.631503 434971 usertrap_amd64.go:212] [ 2689( 106): 2694( 107)] Found the pattern at ip 55857d8e9999:sysno 257 D0318 17:09:39.631536 434971 usertrap_amd64.go:122] [ 2689( 106): 2694( 107)] Allocate a new trap: 0xc000d15aa0 42 D0318 17:09:39.631549 434971 usertrap_amd64.go:225] [ 2689( 106): 2694( 107)] Apply the binary patch addr 55857d8e9999 trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.631774 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.631806 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.631940 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 37 D0318 17:09:39.631954 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.633643 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.633674 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 38 D0318 17:09:39.633685 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.634222 434971 usertrap_amd64.go:212] [ 2689( 106): 2689( 106)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.634250 434971 usertrap_amd64.go:122] [ 2689( 106): 2689( 106)] Allocate a new trap: 0xc000d15aa0 43 D0318 17:09:39.634261 434971 usertrap_amd64.go:225] [ 2689( 106): 2689( 106)] Apply the binary patch addr 55857d8e9c93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.634644 434971 task_exit.go:204] [ 2689( 106): 2689( 106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.634709 434971 task_exit.go:204] [ 2689( 106): 2689( 106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.634734 434971 task_signals.go:204] [ 2689( 106): 2694( 107)] Signal 9, PID: 2689, TID: 2694, fault addr: 0x0: terminating thread group D0318 17:09:39.634772 434971 task_exit.go:204] [ 2689( 106): 2694( 107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.635181 434971 task_exit.go:204] [ 2689( 106): 2694( 107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.635213 434971 task_exit.go:204] [ 2689( 106): 2694( 107)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.635226 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.635465 434971 task_exit.go:204] [ 2689( 106): 2689( 106)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) D0318 17:09:39.636888 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.636931 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 37 D0318 17:09:39.637014 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.638035 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.638055 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 38 D0318 17:09:39.638072 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.638857 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.638877 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 38 D0318 17:09:39.638889 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.639173 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.639269 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 39 D0318 17:09:39.639296 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.642247 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.642291 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 39 D0318 17:09:39.642309 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.642710 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.642732 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 40 D0318 17:09:39.642749 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.643010 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.643138 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 40 D0318 17:09:39.643177 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.643106 434971 usertrap_amd64.go:212] [ 2692( 60): 2697( 61)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.643242 434971 usertrap_amd64.go:122] [ 2692( 60): 2697( 61)] Allocate a new trap: 0xc0013bbc50 41 D0318 17:09:39.643253 434971 usertrap_amd64.go:225] [ 2692( 60): 2697( 61)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.643425 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.643455 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 41 D0318 17:09:39.643465 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.643564 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.643583 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 39 D0318 17:09:39.643594 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.644218 434971 usertrap_amd64.go:212] [ 2692( 60): 2692( 60)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.644346 434971 usertrap_amd64.go:122] [ 2692( 60): 2692( 60)] Allocate a new trap: 0xc0013bbc50 42 D0318 17:09:39.644418 434971 usertrap_amd64.go:225] [ 2692( 60): 2692( 60)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.644859 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.644875 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 36 D0318 17:09:39.644977 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.645548 434971 task_exit.go:204] [ 2692( 60): 2692( 60)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.645552 434971 task_signals.go:204] [ 2692( 60): 2697( 61)] Signal 9, PID: 2692, TID: 2697, fault addr: 0x0: terminating thread group D0318 17:09:39.645580 434971 task_exit.go:204] [ 2692( 60): 2697( 61)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.645680 434971 task_exit.go:204] [ 2692( 60): 2692( 60)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.646017 434971 task_exit.go:204] [ 2692( 60): 2697( 61)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.646109 434971 task_exit.go:204] [ 2692( 60): 2697( 61)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.646193 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.646304 434971 task_exit.go:204] [ 2692( 60): 2692( 60)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.646581 434971 usertrap_amd64.go:212] [ 2691( 624): 2698( 625)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.646614 434971 usertrap_amd64.go:122] [ 2691( 624): 2698( 625)] Allocate a new trap: 0xc000d15ad0 42 D0318 17:09:39.646635 434971 usertrap_amd64.go:225] [ 2691( 624): 2698( 625)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) 17:09:39 executing program 1: add_key(&(0x7f0000001540)='keyring\x00', &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) D0318 17:09:39.646866 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.646881 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 37 D0318 17:09:39.646895 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.647179 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.647195 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 40 D0318 17:09:39.647205 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.647648 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.647695 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 41 D0318 17:09:39.647713 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.647777 434971 usertrap_amd64.go:212] [ 2695( 729): 2699( 730)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.647809 434971 usertrap_amd64.go:122] [ 2695( 729): 2699( 730)] Allocate a new trap: 0xc0013bbc80 42 D0318 17:09:39.647823 434971 usertrap_amd64.go:225] [ 2695( 729): 2699( 730)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.647927 434971 usertrap_amd64.go:212] [ 2691( 624): 2691( 624)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.647948 434971 usertrap_amd64.go:122] [ 2691( 624): 2691( 624)] Allocate a new trap: 0xc000d15ad0 43 D0318 17:09:39.647957 434971 usertrap_amd64.go:225] [ 2691( 624): 2691( 624)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.648747 434971 usertrap_amd64.go:212] [ 2695( 729): 2695( 729)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.648762 434971 usertrap_amd64.go:122] [ 2695( 729): 2695( 729)] Allocate a new trap: 0xc0013bbc80 43 D0318 17:09:39.648771 434971 usertrap_amd64.go:225] [ 2695( 729): 2695( 729)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.649331 434971 task_exit.go:204] [ 2691( 624): 2691( 624)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.649369 434971 task_exit.go:204] [ 2691( 624): 2691( 624)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.649389 434971 task_signals.go:204] [ 2691( 624): 2698( 625)] Signal 9, PID: 2691, TID: 2698, fault addr: 0x0: terminating thread group D0318 17:09:39.649394 434971 task_signals.go:204] [ 2695( 729): 2699( 730)] Signal 9, PID: 2695, TID: 2699, fault addr: 0x0: terminating thread group D0318 17:09:39.649407 434971 task_exit.go:204] [ 2695( 729): 2695( 729)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.649418 434971 task_exit.go:204] [ 2695( 729): 2699( 730)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.649459 434971 task_exit.go:204] [ 2695( 729): 2699( 730)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.649477 434971 task_exit.go:204] [ 2695( 729): 2699( 730)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.649513 434971 task_exit.go:204] [ 2691( 624): 2698( 625)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.649872 434971 task_exit.go:204] [ 2695( 729): 2695( 729)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.649906 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.650186 434971 task_exit.go:204] [ 2691( 624): 2698( 625)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.650228 434971 task_exit.go:204] [ 2691( 624): 2698( 625)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.650255 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.650286 434971 task_exit.go:204] [ 2695( 729): 2695( 729)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.650374 434971 task_exit.go:204] [ 2691( 624): 2691( 624)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000180)=0xfffffe1a) 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x44) D0318 17:09:39.653995 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.654170 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 38 D0318 17:09:39.654284 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.658604 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.658624 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 36 D0318 17:09:39.658712 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.659471 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.659506 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 37 D0318 17:09:39.659681 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.660053 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.660142 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 39 D0318 17:09:39.660177 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.660144 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.660319 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 37 D0318 17:09:39.660352 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.660360 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.660374 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 40 D0318 17:09:39.660383 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.660740 434971 usertrap_amd64.go:212] [ 2696( 108): 2703( 109)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.660811 434971 usertrap_amd64.go:122] [ 2696( 108): 2703( 109)] Allocate a new trap: 0xc0084c3380 41 D0318 17:09:39.660883 434971 usertrap_amd64.go:225] [ 2696( 108): 2703( 109)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.661168 434971 sys_seccomp.go:78] [ 2696( 108): 2703( 109)] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0318 17:09:39.661219 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.661236 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 37 D0318 17:09:39.661348 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.661690 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.661729 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 38 D0318 17:09:39.661715 434971 usertrap_amd64.go:212] [ 2696( 108): 2696( 108)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.661756 434971 usertrap_amd64.go:122] [ 2696( 108): 2696( 108)] Allocate a new trap: 0xc0084c3380 42 D0318 17:09:39.661776 434971 usertrap_amd64.go:225] [ 2696( 108): 2696( 108)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.661742 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.663204 434971 task_exit.go:204] [ 2696( 108): 2696( 108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.663255 434971 task_exit.go:204] [ 2696( 108): 2696( 108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.663247 434971 task_signals.go:204] [ 2696( 108): 2703( 109)] Signal 9, PID: 2696, TID: 2703, fault addr: 0x0: terminating thread group D0318 17:09:39.663279 434971 task_exit.go:204] [ 2696( 108): 2703( 109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.663528 434971 task_exit.go:204] [ 2696( 108): 2703( 109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.663566 434971 task_exit.go:204] [ 2696( 108): 2703( 109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.663580 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.664146 434971 task_exit.go:204] [ 2696( 108): 2696( 108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.664214 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.664307 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 38 D0318 17:09:39.664321 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:39 executing program 0: socketpair$nbd(0x3, 0x1, 0x0, &(0x7f0000000400)) D0318 17:09:39.666571 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.666603 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 38 D0318 17:09:39.666654 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.666673 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 39 D0318 17:09:39.666688 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.666652 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.668591 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.668627 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 39 D0318 17:09:39.668639 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.669741 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.669920 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 40 D0318 17:09:39.669990 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.670094 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.670119 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 39 D0318 17:09:39.670130 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.670222 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.670319 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 41 D0318 17:09:39.670344 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.670513 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.670689 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 40 D0318 17:09:39.670764 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.670903 434971 usertrap_amd64.go:212] [ 2700( 62): 2705( 63)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.670933 434971 usertrap_amd64.go:122] [ 2700( 62): 2705( 63)] Allocate a new trap: 0xc0083c88a0 41 D0318 17:09:39.670942 434971 usertrap_amd64.go:225] [ 2700( 62): 2705( 63)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.670967 434971 usertrap_amd64.go:212] [ 2701( 626): 2704( 627)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.670975 434971 usertrap_amd64.go:122] [ 2701( 626): 2704( 627)] Allocate a new trap: 0xc008058c90 42 D0318 17:09:39.670983 434971 usertrap_amd64.go:225] [ 2701( 626): 2704( 627)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.671566 434971 usertrap_amd64.go:212] [ 2700( 62): 2700( 62)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.671719 434971 usertrap_amd64.go:122] [ 2700( 62): 2700( 62)] Allocate a new trap: 0xc0083c88a0 42 D0318 17:09:39.671740 434971 usertrap_amd64.go:225] [ 2700( 62): 2700( 62)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.672609 434971 usertrap_amd64.go:212] [ 2701( 626): 2701( 626)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.672643 434971 usertrap_amd64.go:122] [ 2701( 626): 2701( 626)] Allocate a new trap: 0xc008058c90 43 D0318 17:09:39.672653 434971 usertrap_amd64.go:225] [ 2701( 626): 2701( 626)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.673274 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.673304 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 40 D0318 17:09:39.673312 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.673626 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.673662 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 41 D0318 17:09:39.673674 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.674171 434971 usertrap_amd64.go:212] [ 2702( 731): 2706( 732)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.674198 434971 usertrap_amd64.go:122] [ 2702( 731): 2706( 732)] Allocate a new trap: 0xc000d15b30 42 D0318 17:09:39.674209 434971 usertrap_amd64.go:225] [ 2702( 731): 2706( 732)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.674393 434971 task_exit.go:204] [ 2700( 62): 2700( 62)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.674445 434971 task_exit.go:204] [ 2700( 62): 2700( 62)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.674472 434971 task_signals.go:204] [ 2700( 62): 2705( 63)] Signal 9, PID: 2700, TID: 2705, fault addr: 0x0: terminating thread group D0318 17:09:39.674472 434971 task_exit.go:204] [ 2701( 626): 2701( 626)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.674515 434971 task_signals.go:204] [ 2701( 626): 2704( 627)] Signal 9, PID: 2701, TID: 2704, fault addr: 0x0: terminating thread group D0318 17:09:39.674516 434971 task_exit.go:204] [ 2701( 626): 2701( 626)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.674669 434971 task_exit.go:204] [ 2701( 626): 2704( 627)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.674759 434971 task_exit.go:204] [ 2700( 62): 2705( 63)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.675183 434971 task_exit.go:204] [ 2700( 62): 2705( 63)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.675210 434971 task_exit.go:204] [ 2700( 62): 2705( 63)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.675233 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.675274 434971 task_exit.go:204] [ 2701( 626): 2704( 627)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.675305 434971 task_exit.go:204] [ 2701( 626): 2704( 627)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.675322 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.675523 434971 usertrap_amd64.go:212] [ 2702( 731): 2702( 731)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.675563 434971 usertrap_amd64.go:122] [ 2702( 731): 2702( 731)] Allocate a new trap: 0xc000d15b30 43 D0318 17:09:39.675577 434971 usertrap_amd64.go:225] [ 2702( 731): 2702( 731)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.675810 434971 task_exit.go:204] [ 2700( 62): 2700( 62)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.676118 434971 task_exit.go:204] [ 2701( 626): 2701( 626)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x11, 0x0, &(0x7f0000000200)) 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8902, &(0x7f0000000000)) D0318 17:09:39.677821 434971 task_exit.go:204] [ 2702( 731): 2702( 731)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.677876 434971 task_exit.go:204] [ 2702( 731): 2702( 731)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.677911 434971 task_signals.go:204] [ 2702( 731): 2706( 732)] Signal 9, PID: 2702, TID: 2706, fault addr: 0x0: terminating thread group D0318 17:09:39.677950 434971 task_exit.go:204] [ 2702( 731): 2706( 732)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.678431 434971 task_exit.go:204] [ 2702( 731): 2706( 732)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.678465 434971 task_exit.go:204] [ 2702( 731): 2706( 732)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.678501 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.679592 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.679731 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 36 D0318 17:09:39.679849 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.679907 434971 task_exit.go:204] [ 2702( 731): 2702( 731)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000140)={0x1, 0x0, [{0x5}]}) D0318 17:09:39.684680 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.684771 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 37 D0318 17:09:39.684860 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.684947 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.684984 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 37 D0318 17:09:39.685149 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.686757 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.686788 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 38 D0318 17:09:39.686823 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.687315 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.687359 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 36 D0318 17:09:39.687452 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.687529 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.687567 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 37 D0318 17:09:39.687708 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.688846 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.688885 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 38 D0318 17:09:39.688905 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.689219 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.689311 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 37 D0318 17:09:39.689344 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.691012 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.691050 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 38 D0318 17:09:39.691064 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.691915 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.691948 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 39 D0318 17:09:39.691960 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.692763 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.692843 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 39 D0318 17:09:39.692911 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.693497 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.693528 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 38 D0318 17:09:39.693540 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.694845 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.694882 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 39 D0318 17:09:39.694898 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.695195 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.695274 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 40 D0318 17:09:39.695298 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.695475 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.695494 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 40 D0318 17:09:39.695509 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.695544 434971 usertrap_amd64.go:212] [ 2707( 110): 2711( 111)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.695574 434971 usertrap_amd64.go:122] [ 2707( 110): 2711( 111)] Allocate a new trap: 0xc0013bbcb0 41 D0318 17:09:39.695585 434971 usertrap_amd64.go:225] [ 2707( 110): 2711( 111)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.695859 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.695885 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 41 D0318 17:09:39.695900 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.695966 434971 usertrap_amd64.go:212] [ 2709( 628): 2712( 629)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.695984 434971 usertrap_amd64.go:122] [ 2709( 628): 2712( 629)] Allocate a new trap: 0xc001195410 42 D0318 17:09:39.695993 434971 usertrap_amd64.go:225] [ 2709( 628): 2712( 629)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.695969 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.696062 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 40 D0318 17:09:39.696076 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.696318 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.696335 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 41 D0318 17:09:39.696346 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.696388 434971 usertrap_amd64.go:212] [ 2707( 110): 2707( 110)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.696395 434971 usertrap_amd64.go:122] [ 2707( 110): 2707( 110)] Allocate a new trap: 0xc0013bbcb0 42 D0318 17:09:39.696403 434971 usertrap_amd64.go:225] [ 2707( 110): 2707( 110)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.696586 434971 usertrap_amd64.go:212] [ 2710( 733): 2713( 734)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.696600 434971 usertrap_amd64.go:122] [ 2710( 733): 2713( 734)] Allocate a new trap: 0xc008349530 42 D0318 17:09:39.696610 434971 usertrap_amd64.go:225] [ 2710( 733): 2713( 734)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.696993 434971 usertrap_amd64.go:212] [ 2709( 628): 2709( 628)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.697103 434971 usertrap_amd64.go:122] [ 2709( 628): 2709( 628)] Allocate a new trap: 0xc001195410 43 D0318 17:09:39.697141 434971 usertrap_amd64.go:225] [ 2709( 628): 2709( 628)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.697609 434971 usertrap_amd64.go:212] [ 2710( 733): 2710( 733)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.697641 434971 usertrap_amd64.go:122] [ 2710( 733): 2710( 733)] Allocate a new trap: 0xc008349530 43 D0318 17:09:39.697650 434971 usertrap_amd64.go:225] [ 2710( 733): 2710( 733)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.697846 434971 task_exit.go:204] [ 2707( 110): 2707( 110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.697892 434971 task_exit.go:204] [ 2707( 110): 2707( 110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.697920 434971 task_signals.go:204] [ 2707( 110): 2711( 111)] Signal 9, PID: 2707, TID: 2711, fault addr: 0x0: terminating thread group D0318 17:09:39.697939 434971 task_exit.go:204] [ 2707( 110): 2711( 111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.698189 434971 task_exit.go:204] [ 2710( 733): 2710( 733)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.698231 434971 task_exit.go:204] [ 2710( 733): 2710( 733)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.698258 434971 task_signals.go:204] [ 2710( 733): 2713( 734)] Signal 9, PID: 2710, TID: 2713, fault addr: 0x0: terminating thread group D0318 17:09:39.698318 434971 task_exit.go:204] [ 2710( 733): 2713( 734)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.698532 434971 task_exit.go:204] [ 2707( 110): 2711( 111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.698573 434971 task_exit.go:204] [ 2707( 110): 2711( 111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.698592 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.698681 434971 task_exit.go:204] [ 2707( 110): 2707( 110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.698911 434971 task_exit.go:204] [ 2710( 733): 2713( 734)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.698973 434971 task_exit.go:204] [ 2710( 733): 2713( 734)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.699044 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x14, 0x0, &(0x7f0000000200)) D0318 17:09:39.699841 434971 task_exit.go:204] [ 2710( 733): 2710( 733)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040), 0xf7) D0318 17:09:39.705351 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.705402 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 39 D0318 17:09:39.705414 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.705590 434971 task_signals.go:204] [ 2709( 628): 2712( 629)] Signal 9, PID: 2709, TID: 2712, fault addr: 0x0: terminating thread group D0318 17:09:39.705611 434971 task_exit.go:204] [ 2709( 628): 2709( 628)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.705648 434971 task_exit.go:204] [ 2709( 628): 2709( 628)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.705650 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.705660 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 40 D0318 17:09:39.705664 434971 task_exit.go:204] [ 2709( 628): 2712( 629)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.705669 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.705896 434971 usertrap_amd64.go:212] [ 2708( 64): 2714( 65)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.705928 434971 usertrap_amd64.go:122] [ 2708( 64): 2714( 65)] Allocate a new trap: 0xc008161b60 41 D0318 17:09:39.705940 434971 usertrap_amd64.go:225] [ 2708( 64): 2714( 65)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.706197 434971 task_exit.go:204] [ 2709( 628): 2712( 629)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.706242 434971 task_exit.go:204] [ 2709( 628): 2712( 629)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.706255 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.707316 434971 task_exit.go:204] [ 2709( 628): 2709( 628)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8954, 0x0) D0318 17:09:39.708076 434971 usertrap_amd64.go:212] [ 2708( 64): 2708( 64)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.708110 434971 usertrap_amd64.go:122] [ 2708( 64): 2708( 64)] Allocate a new trap: 0xc008161b60 42 D0318 17:09:39.708126 434971 usertrap_amd64.go:225] [ 2708( 64): 2708( 64)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.709773 434971 task_exit.go:204] [ 2708( 64): 2708( 64)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.709823 434971 task_exit.go:204] [ 2708( 64): 2708( 64)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.709852 434971 task_signals.go:204] [ 2708( 64): 2714( 65)] Signal 9, PID: 2708, TID: 2714, fault addr: 0x0: terminating thread group D0318 17:09:39.709867 434971 task_exit.go:204] [ 2708( 64): 2714( 65)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.710178 434971 task_exit.go:204] [ 2708( 64): 2714( 65)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.710215 434971 task_exit.go:204] [ 2708( 64): 2714( 65)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.710229 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.710899 434971 task_exit.go:204] [ 2708( 64): 2708( 64)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8903, &(0x7f0000000000)) D0318 17:09:39.712731 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.712764 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 36 D0318 17:09:39.712931 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.713793 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.713813 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 37 D0318 17:09:39.713822 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.717033 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.717069 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 37 D0318 17:09:39.717169 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.718089 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.718201 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 38 D0318 17:09:39.718239 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.718726 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.718812 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 38 D0318 17:09:39.718860 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.719462 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.719497 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 37 D0318 17:09:39.719585 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.721243 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.721282 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 38 D0318 17:09:39.721295 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.721870 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.721905 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 39 D0318 17:09:39.721920 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.722355 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.722393 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 40 D0318 17:09:39.722409 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.722519 434971 usertrap_amd64.go:212] [ 2715( 112): 2719( 113)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.722560 434971 usertrap_amd64.go:122] [ 2715( 112): 2719( 113)] Allocate a new trap: 0xc008058cf0 41 D0318 17:09:39.722574 434971 usertrap_amd64.go:225] [ 2715( 112): 2719( 113)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.723690 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.723727 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 39 D0318 17:09:39.723742 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.723695 434971 usertrap_amd64.go:212] [ 2715( 112): 2715( 112)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.723874 434971 usertrap_amd64.go:122] [ 2715( 112): 2715( 112)] Allocate a new trap: 0xc008058cf0 42 D0318 17:09:39.723928 434971 usertrap_amd64.go:225] [ 2715( 112): 2715( 112)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.724459 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.724523 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 36 D0318 17:09:39.724620 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.726052 434971 task_exit.go:204] [ 2715( 112): 2715( 112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.726112 434971 task_exit.go:204] [ 2715( 112): 2715( 112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.726155 434971 task_signals.go:204] [ 2715( 112): 2719( 113)] Signal 9, PID: 2715, TID: 2719, fault addr: 0x0: terminating thread group D0318 17:09:39.726173 434971 task_exit.go:204] [ 2715( 112): 2719( 113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.726187 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.726216 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 37 D0318 17:09:39.726229 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.726577 434971 task_exit.go:204] [ 2715( 112): 2719( 113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.726623 434971 task_exit.go:204] [ 2715( 112): 2719( 113)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.726636 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.726656 434971 task_exit.go:204] [ 2715( 112): 2715( 112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.726773 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.726815 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 40 D0318 17:09:39.726830 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) 17:09:39 executing program 0: socket(0x11, 0x3, 0xcb) D0318 17:09:39.727221 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.727290 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 39 D0318 17:09:39.727303 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.727734 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.727784 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 41 D0318 17:09:39.727883 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.728005 434971 usertrap_amd64.go:212] [ 2716( 735): 2720( 736)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.728022 434971 usertrap_amd64.go:122] [ 2716( 735): 2720( 736)] Allocate a new trap: 0xc008349590 42 D0318 17:09:39.728031 434971 usertrap_amd64.go:225] [ 2716( 735): 2720( 736)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.728850 434971 usertrap_amd64.go:212] [ 2716( 735): 2716( 735)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.728885 434971 usertrap_amd64.go:122] [ 2716( 735): 2716( 735)] Allocate a new trap: 0xc008349590 43 D0318 17:09:39.728920 434971 usertrap_amd64.go:225] [ 2716( 735): 2716( 735)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.729826 434971 task_exit.go:204] [ 2716( 735): 2716( 735)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.729897 434971 task_signals.go:204] [ 2716( 735): 2720( 736)] Signal 9, PID: 2716, TID: 2720, fault addr: 0x0: terminating thread group D0318 17:09:39.729965 434971 task_exit.go:204] [ 2716( 735): 2716( 735)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.730087 434971 task_exit.go:204] [ 2716( 735): 2720( 736)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.730927 434971 task_exit.go:204] [ 2716( 735): 2720( 736)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.730961 434971 task_exit.go:204] [ 2716( 735): 2720( 736)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.730982 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.731306 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.731342 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 40 D0318 17:09:39.731353 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.731580 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.731692 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 41 D0318 17:09:39.731732 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.731795 434971 usertrap_amd64.go:212] [ 2717( 630): 2721( 631)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.731838 434971 usertrap_amd64.go:122] [ 2717( 630): 2721( 631)] Allocate a new trap: 0xc0083495c0 42 D0318 17:09:39.731853 434971 usertrap_amd64.go:225] [ 2717( 630): 2721( 631)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.731871 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.731905 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 38 D0318 17:09:39.731921 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.732168 434971 task_exit.go:204] [ 2716( 735): 2716( 735)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.732649 434971 usertrap_amd64.go:212] [ 2717( 630): 2717( 630)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.732712 434971 usertrap_amd64.go:122] [ 2717( 630): 2717( 630)] Allocate a new trap: 0xc0083495c0 43 D0318 17:09:39.732743 434971 usertrap_amd64.go:225] [ 2717( 630): 2717( 630)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) 17:09:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000080)) D0318 17:09:39.733745 434971 task_exit.go:204] [ 2717( 630): 2717( 630)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.733790 434971 task_exit.go:204] [ 2717( 630): 2717( 630)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.733819 434971 task_signals.go:204] [ 2717( 630): 2721( 631)] Signal 9, PID: 2717, TID: 2721, fault addr: 0x0: terminating thread group D0318 17:09:39.733833 434971 task_exit.go:204] [ 2717( 630): 2721( 631)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.734175 434971 task_exit.go:204] [ 2717( 630): 2721( 631)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.734207 434971 task_exit.go:204] [ 2717( 630): 2721( 631)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.734218 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.734338 434971 task_exit.go:204] [ 2717( 630): 2717( 630)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040), 0x4) D0318 17:09:39.735146 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.735183 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 39 D0318 17:09:39.735196 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.735548 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.735585 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 40 D0318 17:09:39.735597 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.735928 434971 usertrap_amd64.go:212] [ 2718( 66): 2722( 67)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.735959 434971 usertrap_amd64.go:122] [ 2718( 66): 2722( 67)] Allocate a new trap: 0xc008161bf0 41 D0318 17:09:39.735973 434971 usertrap_amd64.go:225] [ 2718( 66): 2722( 67)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.737085 434971 usertrap_amd64.go:212] [ 2718( 66): 2718( 66)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.737138 434971 usertrap_amd64.go:122] [ 2718( 66): 2718( 66)] Allocate a new trap: 0xc008161bf0 42 D0318 17:09:39.737154 434971 usertrap_amd64.go:225] [ 2718( 66): 2718( 66)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.738283 434971 task_exit.go:204] [ 2718( 66): 2718( 66)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.738337 434971 task_signals.go:204] [ 2718( 66): 2722( 67)] Signal 9, PID: 2718, TID: 2722, fault addr: 0x0: terminating thread group D0318 17:09:39.738388 434971 task_exit.go:204] [ 2718( 66): 2718( 66)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.738450 434971 task_exit.go:204] [ 2718( 66): 2722( 67)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.738741 434971 task_exit.go:204] [ 2718( 66): 2722( 67)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.738778 434971 task_exit.go:204] [ 2718( 66): 2722( 67)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.738791 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.739739 434971 task_exit.go:204] [ 2718( 66): 2718( 66)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x5, 0x90, [], 0x0, 0x0, &(0x7f0000000580)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) D0318 17:09:39.741408 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.741442 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 37 D0318 17:09:39.741558 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.742454 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.742479 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 38 D0318 17:09:39.742495 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.746527 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.746558 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 39 D0318 17:09:39.746570 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.749116 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.749159 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 37 D0318 17:09:39.749258 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.750417 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.750453 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 38 D0318 17:09:39.750470 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.750544 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.750610 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 40 D0318 17:09:39.750628 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.750912 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.750997 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 41 D0318 17:09:39.751063 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.751088 434971 usertrap_amd64.go:212] [ 2723( 632): 2725( 633)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.751135 434971 usertrap_amd64.go:122] [ 2723( 632): 2725( 633)] Allocate a new trap: 0xc0083c8930 42 D0318 17:09:39.751309 434971 usertrap_amd64.go:225] [ 2723( 632): 2725( 633)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.752837 434971 usertrap_amd64.go:212] [ 2723( 632): 2723( 632)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.752879 434971 usertrap_amd64.go:122] [ 2723( 632): 2723( 632)] Allocate a new trap: 0xc0083c8930 43 D0318 17:09:39.752893 434971 usertrap_amd64.go:225] [ 2723( 632): 2723( 632)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.753916 434971 task_exit.go:204] [ 2723( 632): 2723( 632)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.753972 434971 task_exit.go:204] [ 2723( 632): 2723( 632)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.754006 434971 task_signals.go:204] [ 2723( 632): 2725( 633)] Signal 9, PID: 2723, TID: 2725, fault addr: 0x0: terminating thread group D0318 17:09:39.754022 434971 task_exit.go:204] [ 2723( 632): 2725( 633)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.754503 434971 task_exit.go:204] [ 2723( 632): 2725( 633)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.754543 434971 task_exit.go:204] [ 2723( 632): 2725( 633)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.754557 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.755040 434971 task_exit.go:204] [ 2723( 632): 2723( 632)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: socketpair$nbd(0xa, 0x1, 0x0, &(0x7f0000000400)) D0318 17:09:39.756714 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.756753 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 39 D0318 17:09:39.756770 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.760709 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.760755 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 40 D0318 17:09:39.760771 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.761008 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.761041 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 41 D0318 17:09:39.761051 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.761255 434971 usertrap_amd64.go:212] [ 2724( 737): 2728( 738)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.761951 434971 usertrap_amd64.go:122] [ 2724( 737): 2728( 738)] Allocate a new trap: 0xc001596480 42 D0318 17:09:39.761972 434971 usertrap_amd64.go:225] [ 2724( 737): 2728( 738)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.763328 434971 usertrap_amd64.go:212] [ 2724( 737): 2724( 737)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.763370 434971 usertrap_amd64.go:122] [ 2724( 737): 2724( 737)] Allocate a new trap: 0xc001596480 43 D0318 17:09:39.763390 434971 usertrap_amd64.go:225] [ 2724( 737): 2724( 737)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.764461 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.764483 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.764525 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 36 D0318 17:09:39.764494 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 36 D0318 17:09:39.764632 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.764630 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.766160 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.766237 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 37 D0318 17:09:39.766270 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.766319 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.766358 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 37 D0318 17:09:39.766375 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.770355 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.770394 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 38 D0318 17:09:39.770409 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.772573 434971 task_exit.go:204] [ 2724( 737): 2724( 737)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.772654 434971 task_exit.go:204] [ 2724( 737): 2724( 737)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.772657 434971 task_signals.go:204] [ 2724( 737): 2728( 738)] Signal 9, PID: 2724, TID: 2728, fault addr: 0x0: terminating thread group D0318 17:09:39.772687 434971 task_exit.go:204] [ 2724( 737): 2728( 738)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.772568 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.772774 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 38 D0318 17:09:39.772799 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.773115 434971 task_exit.go:204] [ 2724( 737): 2728( 738)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.773152 434971 task_exit.go:204] [ 2724( 737): 2728( 738)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.773165 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.773256 434971 task_exit.go:204] [ 2724( 737): 2724( 737)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) D0318 17:09:39.774160 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.774253 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 39 D0318 17:09:39.774281 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.774687 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.774716 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 40 D0318 17:09:39.774733 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.774785 434971 usertrap_amd64.go:212] [ 2727( 68): 2730( 69)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.774808 434971 usertrap_amd64.go:122] [ 2727( 68): 2730( 69)] Allocate a new trap: 0xc0013bbd40 41 D0318 17:09:39.774821 434971 usertrap_amd64.go:225] [ 2727( 68): 2730( 69)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.776800 434971 usertrap_amd64.go:212] [ 2727( 68): 2727( 68)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.776874 434971 usertrap_amd64.go:122] [ 2727( 68): 2727( 68)] Allocate a new trap: 0xc0013bbd40 42 D0318 17:09:39.776894 434971 usertrap_amd64.go:225] [ 2727( 68): 2727( 68)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.776958 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.776993 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 39 D0318 17:09:39.777010 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.777301 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.777346 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 40 D0318 17:09:39.777361 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.777409 434971 usertrap_amd64.go:212] [ 2726( 114): 2731( 115)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.777438 434971 usertrap_amd64.go:122] [ 2726( 114): 2731( 115)] Allocate a new trap: 0xc000b1d1d0 41 D0318 17:09:39.777451 434971 usertrap_amd64.go:225] [ 2726( 114): 2731( 115)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.777759 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.777780 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 37 D0318 17:09:39.777925 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.777945 434971 task_exit.go:204] [ 2727( 68): 2727( 68)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.778199 434971 task_exit.go:204] [ 2727( 68): 2727( 68)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.778235 434971 task_signals.go:204] [ 2727( 68): 2730( 69)] Signal 9, PID: 2727, TID: 2730, fault addr: 0x0: terminating thread group D0318 17:09:39.778254 434971 task_exit.go:204] [ 2727( 68): 2730( 69)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.778392 434971 usertrap_amd64.go:212] [ 2726( 114): 2726( 114)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.778425 434971 usertrap_amd64.go:122] [ 2726( 114): 2726( 114)] Allocate a new trap: 0xc000b1d1d0 42 D0318 17:09:39.778436 434971 usertrap_amd64.go:225] [ 2726( 114): 2726( 114)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.778668 434971 task_exit.go:204] [ 2727( 68): 2730( 69)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.778699 434971 task_exit.go:204] [ 2727( 68): 2730( 69)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.778711 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.778962 434971 task_exit.go:204] [ 2727( 68): 2727( 68)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: prctl$PR_GET_SECCOMP(0x24) D0318 17:09:39.780391 434971 task_exit.go:204] [ 2726( 114): 2726( 114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.780478 434971 task_signals.go:204] [ 2726( 114): 2731( 115)] Signal 9, PID: 2726, TID: 2731, fault addr: 0x0: terminating thread group D0318 17:09:39.780520 434971 task_exit.go:204] [ 2726( 114): 2726( 114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.780601 434971 task_exit.go:204] [ 2726( 114): 2731( 115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.780984 434971 task_exit.go:204] [ 2726( 114): 2731( 115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.781017 434971 task_exit.go:204] [ 2726( 114): 2731( 115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.781030 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.781545 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.781563 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 38 D0318 17:09:39.781573 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.781953 434971 task_exit.go:204] [ 2726( 114): 2726( 114)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8914, 0x0) D0318 17:09:39.787934 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.787975 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 36 D0318 17:09:39.788159 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.788219 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.788255 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 39 D0318 17:09:39.788266 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.788725 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.788742 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 37 D0318 17:09:39.788834 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.789771 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.789790 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 37 D0318 17:09:39.789801 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.790975 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.791055 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 38 D0318 17:09:39.791098 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.791774 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.791859 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 40 D0318 17:09:39.791892 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.792203 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.792273 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 41 D0318 17:09:39.792309 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.792615 434971 usertrap_amd64.go:212] [ 2729( 634): 2735( 635)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.792651 434971 usertrap_amd64.go:122] [ 2729( 634): 2735( 635)] Allocate a new trap: 0xc008058d20 42 D0318 17:09:39.792666 434971 usertrap_amd64.go:225] [ 2729( 634): 2735( 635)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.794543 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.794574 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 38 D0318 17:09:39.794585 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.795184 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.795215 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 39 D0318 17:09:39.795229 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.795761 434971 usertrap_amd64.go:212] [ 2729( 634): 2729( 634)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.795837 434971 usertrap_amd64.go:122] [ 2729( 634): 2729( 634)] Allocate a new trap: 0xc008058d20 43 D0318 17:09:39.795906 434971 usertrap_amd64.go:225] [ 2729( 634): 2729( 634)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.797511 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.797541 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 39 D0318 17:09:39.797552 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.797800 434971 task_exit.go:204] [ 2729( 634): 2729( 634)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.797920 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.798062 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 36 D0318 17:09:39.798047 434971 task_exit.go:204] [ 2729( 634): 2729( 634)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.798168 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.798237 434971 task_signals.go:204] [ 2729( 634): 2735( 635)] Signal 9, PID: 2729, TID: 2735, fault addr: 0x0: terminating thread group D0318 17:09:39.798309 434971 task_exit.go:204] [ 2729( 634): 2735( 635)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.798372 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.798416 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 40 D0318 17:09:39.798434 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.798623 434971 usertrap_amd64.go:212] [ 2732( 70): 2736( 71)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.798664 434971 usertrap_amd64.go:122] [ 2732( 70): 2736( 71)] Allocate a new trap: 0xc0090981b0 41 D0318 17:09:39.798683 434971 usertrap_amd64.go:225] [ 2732( 70): 2736( 71)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.798633 434971 task_exit.go:204] [ 2729( 634): 2735( 635)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.798912 434971 task_exit.go:204] [ 2729( 634): 2735( 635)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.798936 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.799019 434971 task_exit.go:204] [ 2729( 634): 2729( 634)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.799820 434971 usertrap_amd64.go:212] [ 2732( 70): 2732( 70)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.799852 434971 usertrap_amd64.go:122] [ 2732( 70): 2732( 70)] Allocate a new trap: 0xc0090981b0 42 D0318 17:09:39.799868 434971 usertrap_amd64.go:225] [ 2732( 70): 2732( 70)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x15, 0x0, &(0x7f0000000200)) D0318 17:09:39.808323 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.808369 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 40 D0318 17:09:39.808389 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.808773 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.808809 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 41 D0318 17:09:39.808824 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.808916 434971 usertrap_amd64.go:212] [ 2733( 739): 2737( 740)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.808938 434971 usertrap_amd64.go:122] [ 2733( 739): 2737( 740)] Allocate a new trap: 0xc0083c8960 42 D0318 17:09:39.808946 434971 usertrap_amd64.go:225] [ 2733( 739): 2737( 740)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.810183 434971 task_exit.go:204] [ 2732( 70): 2732( 70)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.810379 434971 task_exit.go:204] [ 2732( 70): 2732( 70)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.810315 434971 usertrap_amd64.go:212] [ 2733( 739): 2733( 739)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.810428 434971 usertrap_amd64.go:122] [ 2733( 739): 2733( 739)] Allocate a new trap: 0xc0083c8960 43 D0318 17:09:39.810432 434971 task_signals.go:204] [ 2732( 70): 2736( 71)] Signal 9, PID: 2732, TID: 2736, fault addr: 0x0: terminating thread group D0318 17:09:39.810447 434971 usertrap_amd64.go:225] [ 2733( 739): 2733( 739)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.810451 434971 task_exit.go:204] [ 2732( 70): 2736( 71)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.810874 434971 task_exit.go:204] [ 2732( 70): 2736( 71)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.810910 434971 task_exit.go:204] [ 2732( 70): 2736( 71)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.810926 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.811268 434971 task_exit.go:204] [ 2732( 70): 2732( 70)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: add_key(&(0x7f0000000200)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) D0318 17:09:39.814170 434971 task_exit.go:204] [ 2733( 739): 2733( 739)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.814212 434971 task_exit.go:204] [ 2733( 739): 2733( 739)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.814235 434971 task_signals.go:204] [ 2733( 739): 2737( 740)] Signal 9, PID: 2733, TID: 2737, fault addr: 0x0: terminating thread group D0318 17:09:39.814247 434971 task_exit.go:204] [ 2733( 739): 2737( 740)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.814646 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.814781 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 37 D0318 17:09:39.814881 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.814674 434971 task_exit.go:204] [ 2733( 739): 2737( 740)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.815084 434971 task_exit.go:204] [ 2733( 739): 2737( 740)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.815161 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.815276 434971 task_exit.go:204] [ 2733( 739): 2733( 739)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.815410 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.815496 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 37 D0318 17:09:39.815710 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) D0318 17:09:39.817308 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.817368 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 38 D0318 17:09:39.817432 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.820560 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.820590 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 38 D0318 17:09:39.820602 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.822875 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.822918 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 39 D0318 17:09:39.822930 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.823195 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.823286 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 40 D0318 17:09:39.823326 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.824370 434971 usertrap_amd64.go:212] [ 2734( 116): 2740( 117)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.824388 434971 usertrap_amd64.go:122] [ 2734( 116): 2740( 117)] Allocate a new trap: 0xc0013bbd70 41 D0318 17:09:39.824398 434971 usertrap_amd64.go:225] [ 2734( 116): 2740( 117)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.824942 434971 usertrap_amd64.go:212] [ 2734( 116): 2734( 116)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.824961 434971 usertrap_amd64.go:122] [ 2734( 116): 2734( 116)] Allocate a new trap: 0xc0013bbd70 42 D0318 17:09:39.824970 434971 usertrap_amd64.go:225] [ 2734( 116): 2734( 116)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.826339 434971 task_exit.go:204] [ 2734( 116): 2734( 116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.826377 434971 task_exit.go:204] [ 2734( 116): 2734( 116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.826402 434971 task_signals.go:204] [ 2734( 116): 2740( 117)] Signal 9, PID: 2734, TID: 2740, fault addr: 0x0: terminating thread group D0318 17:09:39.826427 434971 task_exit.go:204] [ 2734( 116): 2740( 117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.826770 434971 task_exit.go:204] [ 2734( 116): 2740( 117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.826781 434971 task_exit.go:204] [ 2734( 116): 2740( 117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.826791 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.827066 434971 task_exit.go:204] [ 2734( 116): 2734( 116)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: add_key(&(0x7f0000001540)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) D0318 17:09:39.830615 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.830805 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 39 D0318 17:09:39.830823 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.831178 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.831209 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 37 D0318 17:09:39.831283 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.832794 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.832826 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 38 D0318 17:09:39.832843 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.835492 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.835521 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 40 D0318 17:09:39.835537 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.835757 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.835782 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 36 D0318 17:09:39.835793 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.835809 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 41 D0318 17:09:39.835842 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.835890 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.835921 434971 usertrap_amd64.go:212] [ 2738( 636): 2742( 637)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.836086 434971 usertrap_amd64.go:122] [ 2738( 636): 2742( 637)] Allocate a new trap: 0xc0013bbda0 42 D0318 17:09:39.836159 434971 usertrap_amd64.go:225] [ 2738( 636): 2742( 637)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.836952 434971 usertrap_amd64.go:212] [ 2738( 636): 2738( 636)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.836986 434971 usertrap_amd64.go:122] [ 2738( 636): 2738( 636)] Allocate a new trap: 0xc0013bbda0 43 D0318 17:09:39.837002 434971 usertrap_amd64.go:225] [ 2738( 636): 2738( 636)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.837344 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.837372 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 37 D0318 17:09:39.837383 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.838128 434971 task_exit.go:204] [ 2738( 636): 2738( 636)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.838198 434971 task_exit.go:204] [ 2738( 636): 2738( 636)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.838231 434971 task_signals.go:204] [ 2738( 636): 2742( 637)] Signal 9, PID: 2738, TID: 2742, fault addr: 0x0: terminating thread group D0318 17:09:39.838327 434971 task_exit.go:204] [ 2738( 636): 2742( 637)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.838806 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.838833 434971 task_exit.go:204] [ 2738( 636): 2742( 637)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.838854 434971 task_exit.go:204] [ 2738( 636): 2742( 637)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.838866 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.838840 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 39 D0318 17:09:39.838935 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.839867 434971 task_exit.go:204] [ 2738( 636): 2738( 636)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x2, &(0x7f0000000000)) D0318 17:09:39.843461 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.843556 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 40 D0318 17:09:39.843670 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.843982 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.844085 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 38 D0318 17:09:39.844103 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.844236 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.844263 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 41 D0318 17:09:39.844274 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.845124 434971 usertrap_amd64.go:212] [ 2739( 741): 2744( 742)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.845215 434971 usertrap_amd64.go:122] [ 2739( 741): 2744( 742)] Allocate a new trap: 0xc000d15b60 42 D0318 17:09:39.845230 434971 usertrap_amd64.go:225] [ 2739( 741): 2744( 742)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.846749 434971 usertrap_amd64.go:212] [ 2739( 741): 2739( 741)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.846792 434971 usertrap_amd64.go:122] [ 2739( 741): 2739( 741)] Allocate a new trap: 0xc000d15b60 43 D0318 17:09:39.846806 434971 usertrap_amd64.go:225] [ 2739( 741): 2739( 741)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.847391 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.847421 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 39 D0318 17:09:39.847431 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.847675 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.847718 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 40 D0318 17:09:39.847731 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.847819 434971 usertrap_amd64.go:212] [ 2741( 72): 2745( 73)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.847970 434971 usertrap_amd64.go:122] [ 2741( 72): 2745( 73)] Allocate a new trap: 0xc0084c33e0 41 D0318 17:09:39.847986 434971 usertrap_amd64.go:225] [ 2741( 72): 2745( 73)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.848077 434971 task_exit.go:204] [ 2739( 741): 2739( 741)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.848139 434971 task_exit.go:204] [ 2739( 741): 2739( 741)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.848169 434971 task_signals.go:204] [ 2739( 741): 2744( 742)] Signal 9, PID: 2739, TID: 2744, fault addr: 0x0: terminating thread group D0318 17:09:39.848194 434971 usertrap_amd64.go:212] [ 2741( 72): 2741( 72)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.848213 434971 usertrap_amd64.go:122] [ 2741( 72): 2741( 72)] Allocate a new trap: 0xc0084c33e0 42 D0318 17:09:39.848223 434971 usertrap_amd64.go:225] [ 2741( 72): 2741( 72)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.848204 434971 task_exit.go:204] [ 2739( 741): 2744( 742)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.848721 434971 task_exit.go:204] [ 2739( 741): 2744( 742)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.848754 434971 task_exit.go:204] [ 2739( 741): 2744( 742)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.848799 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.849125 434971 task_exit.go:204] [ 2739( 741): 2739( 741)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.850176 434971 task_exit.go:204] [ 2741( 72): 2741( 72)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.850234 434971 task_signals.go:204] [ 2741( 72): 2745( 73)] Signal 9, PID: 2741, TID: 2745, fault addr: 0x0: terminating thread group D0318 17:09:39.850271 434971 task_exit.go:204] [ 2741( 72): 2741( 72)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.850285 434971 task_exit.go:204] [ 2741( 72): 2745( 73)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.850662 434971 task_exit.go:204] [ 2741( 72): 2745( 73)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.850691 434971 task_exit.go:204] [ 2741( 72): 2745( 73)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.850700 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.851178 434971 task_exit.go:204] [ 2741( 72): 2741( 72)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: mq_open(&(0x7f00000001c0)=')\x00', 0x40, 0x0, &(0x7f0000000200)={0x0, 0x101, 0xd47d, 0x20}) 17:09:39 executing program 1: prctl$PR_GET_SECCOMP(0x3b) D0318 17:09:39.861947 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.862028 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 36 D0318 17:09:39.862166 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.862196 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.862234 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 37 D0318 17:09:39.862401 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.863371 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.863399 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 37 D0318 17:09:39.863504 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.864467 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.864516 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 37 D0318 17:09:39.864527 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.864474 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.864679 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 38 D0318 17:09:39.864754 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.866106 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.866138 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 38 D0318 17:09:39.866149 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.870619 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.870647 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 39 D0318 17:09:39.870660 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.871076 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.871141 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 38 D0318 17:09:39.871159 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.871573 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.871651 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 36 D0318 17:09:39.871812 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.873591 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.873623 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 39 D0318 17:09:39.873641 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.874507 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.874541 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 40 D0318 17:09:39.874555 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.874785 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.874806 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 41 D0318 17:09:39.874816 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.874931 434971 usertrap_amd64.go:212] [ 2747( 743): 2749( 744)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.874956 434971 usertrap_amd64.go:122] [ 2747( 743): 2749( 744)] Allocate a new trap: 0xc0084c3410 42 D0318 17:09:39.874965 434971 usertrap_amd64.go:225] [ 2747( 743): 2749( 744)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.875645 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.875712 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 39 D0318 17:09:39.875768 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.876028 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.876113 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 40 D0318 17:09:39.876154 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.876246 434971 usertrap_amd64.go:212] [ 2743( 118): 2750( 119)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.876273 434971 usertrap_amd64.go:122] [ 2743( 118): 2750( 119)] Allocate a new trap: 0xc008161c50 41 D0318 17:09:39.876287 434971 usertrap_amd64.go:225] [ 2743( 118): 2750( 119)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.876533 434971 usertrap_amd64.go:212] [ 2743( 118): 2743( 118)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.876589 434971 usertrap_amd64.go:122] [ 2743( 118): 2743( 118)] Allocate a new trap: 0xc008161c50 42 D0318 17:09:39.876599 434971 usertrap_amd64.go:225] [ 2743( 118): 2743( 118)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.876772 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.876799 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 37 D0318 17:09:39.876807 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.877227 434971 usertrap_amd64.go:212] [ 2747( 743): 2747( 743)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.877257 434971 usertrap_amd64.go:122] [ 2747( 743): 2747( 743)] Allocate a new trap: 0xc0084c3410 43 D0318 17:09:39.877273 434971 usertrap_amd64.go:225] [ 2747( 743): 2747( 743)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.877937 434971 task_exit.go:204] [ 2747( 743): 2747( 743)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.878000 434971 task_signals.go:204] [ 2747( 743): 2749( 744)] Signal 9, PID: 2747, TID: 2749, fault addr: 0x0: terminating thread group D0318 17:09:39.878002 434971 task_signals.go:204] [ 2743( 118): 2750( 119)] Signal 9, PID: 2743, TID: 2750, fault addr: 0x0: terminating thread group D0318 17:09:39.878020 434971 task_exit.go:204] [ 2747( 743): 2747( 743)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.878036 434971 task_exit.go:204] [ 2743( 118): 2743( 118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.878086 434971 task_exit.go:204] [ 2743( 118): 2743( 118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.878100 434971 task_exit.go:204] [ 2747( 743): 2749( 744)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.878122 434971 task_exit.go:204] [ 2743( 118): 2750( 119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.878294 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.878330 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 40 D0318 17:09:39.878343 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.878502 434971 task_exit.go:204] [ 2747( 743): 2749( 744)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.878541 434971 task_exit.go:204] [ 2747( 743): 2749( 744)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.878552 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.878517 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.878592 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 41 D0318 17:09:39.878606 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.878736 434971 usertrap_amd64.go:212] [ 2746( 638): 2751( 639)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.878764 434971 usertrap_amd64.go:122] [ 2746( 638): 2751( 639)] Allocate a new trap: 0xc009098210 42 D0318 17:09:39.878773 434971 usertrap_amd64.go:225] [ 2746( 638): 2751( 639)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.878920 434971 task_exit.go:204] [ 2747( 743): 2747( 743)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.879128 434971 task_exit.go:204] [ 2743( 118): 2750( 119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.879233 434971 task_exit.go:204] [ 2743( 118): 2750( 119)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.879256 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x2, 0x0, &(0x7f0000000200)) D0318 17:09:39.880149 434971 usertrap_amd64.go:212] [ 2746( 638): 2746( 638)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.880239 434971 usertrap_amd64.go:122] [ 2746( 638): 2746( 638)] Allocate a new trap: 0xc009098210 43 D0318 17:09:39.880272 434971 usertrap_amd64.go:225] [ 2746( 638): 2746( 638)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.880368 434971 task_exit.go:204] [ 2743( 118): 2743( 118)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: socketpair$nbd(0x1, 0x3, 0x0, &(0x7f0000000400)) D0318 17:09:39.881689 434971 task_exit.go:204] [ 2746( 638): 2746( 638)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.881732 434971 task_exit.go:204] [ 2746( 638): 2746( 638)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.881760 434971 task_signals.go:204] [ 2746( 638): 2751( 639)] Signal 9, PID: 2746, TID: 2751, fault addr: 0x0: terminating thread group D0318 17:09:39.881775 434971 task_exit.go:204] [ 2746( 638): 2751( 639)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.882136 434971 task_exit.go:204] [ 2746( 638): 2751( 639)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.882163 434971 task_exit.go:204] [ 2746( 638): 2751( 639)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.882176 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.882457 434971 task_exit.go:204] [ 2746( 638): 2746( 638)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x5, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:39.883709 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.883753 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 38 D0318 17:09:39.883765 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.889880 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.889927 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 39 D0318 17:09:39.889943 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.889985 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.890073 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 36 D0318 17:09:39.890108 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.890209 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 40 D0318 17:09:39.890228 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.890264 434971 usertrap_amd64.go:212] [ 2748( 74): 2755( 75)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.890287 434971 usertrap_amd64.go:122] [ 2748( 74): 2755( 75)] Allocate a new trap: 0xc009098240 41 D0318 17:09:39.890295 434971 usertrap_amd64.go:225] [ 2748( 74): 2755( 75)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.890677 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.890965 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.890989 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 37 D0318 17:09:39.891134 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.891327 434971 usertrap_amd64.go:212] [ 2748( 74): 2748( 74)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.891345 434971 usertrap_amd64.go:122] [ 2748( 74): 2748( 74)] Allocate a new trap: 0xc009098240 42 D0318 17:09:39.891354 434971 usertrap_amd64.go:225] [ 2748( 74): 2748( 74)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.892727 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.892916 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 37 D0318 17:09:39.893011 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.892736 434971 task_exit.go:204] [ 2748( 74): 2748( 74)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.893259 434971 task_signals.go:204] [ 2748( 74): 2755( 75)] Signal 9, PID: 2748, TID: 2755, fault addr: 0x0: terminating thread group D0318 17:09:39.893361 434971 task_exit.go:204] [ 2748( 74): 2748( 74)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.893568 434971 task_exit.go:204] [ 2748( 74): 2755( 75)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.894216 434971 task_exit.go:204] [ 2748( 74): 2755( 75)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.894261 434971 task_exit.go:204] [ 2748( 74): 2755( 75)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.894275 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.894826 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.894863 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 38 D0318 17:09:39.894878 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.895482 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.895516 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 37 D0318 17:09:39.895665 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.897391 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.897422 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 38 D0318 17:09:39.897434 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.897790 434971 task_exit.go:204] [ 2748( 74): 2748( 74)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0xa3e) D0318 17:09:39.899881 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.899913 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 39 D0318 17:09:39.899925 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.902911 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.902940 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 40 D0318 17:09:39.902951 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.903143 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.903194 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 41 D0318 17:09:39.903288 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.903391 434971 usertrap_amd64.go:212] [ 2753( 745): 2757( 746)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.903484 434971 usertrap_amd64.go:122] [ 2753( 745): 2757( 746)] Allocate a new trap: 0xc008161c80 42 D0318 17:09:39.903565 434971 usertrap_amd64.go:225] [ 2753( 745): 2757( 746)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.904461 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.904483 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 38 D0318 17:09:39.904500 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.905064 434971 usertrap_amd64.go:212] [ 2753( 745): 2753( 745)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.905106 434971 usertrap_amd64.go:122] [ 2753( 745): 2753( 745)] Allocate a new trap: 0xc008161c80 43 D0318 17:09:39.905121 434971 usertrap_amd64.go:225] [ 2753( 745): 2753( 745)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.907174 434971 task_exit.go:204] [ 2753( 745): 2753( 745)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.907343 434971 task_exit.go:204] [ 2753( 745): 2753( 745)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.907395 434971 task_signals.go:204] [ 2753( 745): 2757( 746)] Signal 9, PID: 2753, TID: 2757, fault addr: 0x0: terminating thread group D0318 17:09:39.907426 434971 task_exit.go:204] [ 2753( 745): 2757( 746)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.907718 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.907761 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 39 D0318 17:09:39.907777 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.907857 434971 task_exit.go:204] [ 2753( 745): 2757( 746)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.907894 434971 task_exit.go:204] [ 2753( 745): 2757( 746)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.907909 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.908186 434971 task_exit.go:204] [ 2753( 745): 2753( 745)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.909801 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.909837 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 36 D0318 17:09:39.909940 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.911403 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.911443 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 37 D0318 17:09:39.911461 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.911567 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.911654 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 40 D0318 17:09:39.911673 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.912232 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.912258 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 41 D0318 17:09:39.912271 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.912478 434971 usertrap_amd64.go:212] [ 2754( 640): 2758( 641)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.912496 434971 usertrap_amd64.go:122] [ 2754( 640): 2758( 641)] Allocate a new trap: 0xc008349620 42 D0318 17:09:39.912508 434971 usertrap_amd64.go:225] [ 2754( 640): 2758( 641)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.912904 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.912938 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 39 D0318 17:09:39.912948 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.913535 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.913567 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 40 D0318 17:09:39.913596 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.913937 434971 usertrap_amd64.go:212] [ 2752( 120): 2759( 121)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.914017 434971 usertrap_amd64.go:122] [ 2752( 120): 2759( 121)] Allocate a new trap: 0xc0013bbe00 41 D0318 17:09:39.914052 434971 usertrap_amd64.go:225] [ 2752( 120): 2759( 121)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.914183 434971 usertrap_amd64.go:212] [ 2754( 640): 2754( 640)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.914289 434971 usertrap_amd64.go:122] [ 2754( 640): 2754( 640)] Allocate a new trap: 0xc008349620 43 D0318 17:09:39.914322 434971 usertrap_amd64.go:225] [ 2754( 640): 2754( 640)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.914661 434971 usertrap_amd64.go:212] [ 2752( 120): 2752( 120)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.914857 434971 usertrap_amd64.go:122] [ 2752( 120): 2752( 120)] Allocate a new trap: 0xc0013bbe00 42 D0318 17:09:39.914897 434971 usertrap_amd64.go:225] [ 2752( 120): 2752( 120)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.916211 434971 task_exit.go:204] [ 2752( 120): 2752( 120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.916330 434971 task_signals.go:204] [ 2752( 120): 2759( 121)] Signal 9, PID: 2752, TID: 2759, fault addr: 0x0: terminating thread group D0318 17:09:39.916424 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.916493 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 38 D0318 17:09:39.916423 434971 task_signals.go:204] [ 2754( 640): 2758( 641)] Signal 9, PID: 2754, TID: 2758, fault addr: 0x0: terminating thread group D0318 17:09:39.916530 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.916444 434971 task_exit.go:204] [ 2752( 120): 2752( 120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.916743 434971 task_exit.go:204] [ 2754( 640): 2754( 640)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.916772 434971 task_exit.go:204] [ 2754( 640): 2754( 640)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.916784 434971 task_exit.go:204] [ 2752( 120): 2759( 121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.916861 434971 task_exit.go:204] [ 2754( 640): 2758( 641)] Transitioning from exit state TaskExitNone to TaskExitInitiated 17:09:39 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', 0x0}) D0318 17:09:39.917274 434971 task_exit.go:204] [ 2754( 640): 2758( 641)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.917305 434971 task_exit.go:204] [ 2754( 640): 2758( 641)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.917320 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.917438 434971 task_exit.go:204] [ 2754( 640): 2754( 640)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: getgroups(0x2, &(0x7f0000000040)=[0xee00, 0xffffffffffffffff]) D0318 17:09:39.918778 434971 task_exit.go:204] [ 2752( 120): 2759( 121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.918808 434971 task_exit.go:204] [ 2752( 120): 2759( 121)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.918820 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.919511 434971 task_exit.go:204] [ 2752( 120): 2752( 120)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: mq_open(&(0x7f0000001340)='\x00', 0x0, 0x0, &(0x7f0000001380)) D0318 17:09:39.922615 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.922722 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 39 D0318 17:09:39.922823 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.923252 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.923284 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 40 D0318 17:09:39.923297 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.923393 434971 usertrap_amd64.go:212] [ 2756( 76): 2761( 77)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.923428 434971 usertrap_amd64.go:122] [ 2756( 76): 2761( 77)] Allocate a new trap: 0xc000b1d260 41 D0318 17:09:39.923441 434971 usertrap_amd64.go:225] [ 2756( 76): 2761( 77)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.924038 434971 usertrap_amd64.go:212] [ 2756( 76): 2756( 76)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.924074 434971 usertrap_amd64.go:122] [ 2756( 76): 2756( 76)] Allocate a new trap: 0xc000b1d260 42 D0318 17:09:39.924084 434971 usertrap_amd64.go:225] [ 2756( 76): 2756( 76)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.925299 434971 task_exit.go:204] [ 2756( 76): 2756( 76)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.925430 434971 task_exit.go:204] [ 2756( 76): 2756( 76)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.925467 434971 task_signals.go:204] [ 2756( 76): 2761( 77)] Signal 9, PID: 2756, TID: 2761, fault addr: 0x0: terminating thread group D0318 17:09:39.925512 434971 task_exit.go:204] [ 2756( 76): 2761( 77)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.925990 434971 task_exit.go:204] [ 2756( 76): 2761( 77)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.926024 434971 task_exit.go:204] [ 2756( 76): 2761( 77)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.926036 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.926502 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.926543 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 37 D0318 17:09:39.926644 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.927719 434971 task_exit.go:204] [ 2756( 76): 2756( 76)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.927844 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.927866 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 38 D0318 17:09:39.927879 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x0, {{0x2, 0x0, @remote}}}, 0x88) D0318 17:09:39.931974 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.932012 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 37 D0318 17:09:39.932114 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.932744 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.932848 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 39 D0318 17:09:39.932869 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.935205 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.935237 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 38 D0318 17:09:39.935256 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.936779 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.936811 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.936833 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 36 D0318 17:09:39.936925 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.936819 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 40 D0318 17:09:39.937002 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.937238 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.937278 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 41 D0318 17:09:39.937292 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.937388 434971 usertrap_amd64.go:212] [ 2760( 747): 2764( 748)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.937411 434971 usertrap_amd64.go:122] [ 2760( 747): 2764( 748)] Allocate a new trap: 0xc0084c34a0 42 D0318 17:09:39.937423 434971 usertrap_amd64.go:225] [ 2760( 747): 2764( 748)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.938335 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.938430 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 37 D0318 17:09:39.938787 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.938544 434971 usertrap_amd64.go:212] [ 2760( 747): 2760( 747)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.938998 434971 usertrap_amd64.go:122] [ 2760( 747): 2760( 747)] Allocate a new trap: 0xc0084c34a0 43 D0318 17:09:39.939116 434971 usertrap_amd64.go:225] [ 2760( 747): 2760( 747)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.940227 434971 task_exit.go:204] [ 2760( 747): 2760( 747)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.940275 434971 task_exit.go:204] [ 2760( 747): 2760( 747)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.940304 434971 task_signals.go:204] [ 2760( 747): 2764( 748)] Signal 9, PID: 2760, TID: 2764, fault addr: 0x0: terminating thread group D0318 17:09:39.940427 434971 task_exit.go:204] [ 2760( 747): 2764( 748)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.940861 434971 task_exit.go:204] [ 2760( 747): 2764( 748)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.940940 434971 task_exit.go:204] [ 2760( 747): 2764( 748)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.941012 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.941109 434971 task_exit.go:204] [ 2760( 747): 2760( 747)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x40086602, &(0x7f0000000000)) D0318 17:09:39.942119 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.942281 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 39 D0318 17:09:39.942314 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.944797 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.944822 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 38 D0318 17:09:39.944833 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.946427 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.946536 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 40 D0318 17:09:39.946651 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.946966 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.946992 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 41 D0318 17:09:39.947005 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.947243 434971 usertrap_amd64.go:212] [ 2762( 642): 2766( 643)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.947285 434971 usertrap_amd64.go:122] [ 2762( 642): 2766( 643)] Allocate a new trap: 0xc000d15b90 42 D0318 17:09:39.947299 434971 usertrap_amd64.go:225] [ 2762( 642): 2766( 643)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.947750 434971 usertrap_amd64.go:212] [ 2762( 642): 2762( 642)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.947831 434971 usertrap_amd64.go:122] [ 2762( 642): 2762( 642)] Allocate a new trap: 0xc000d15b90 43 D0318 17:09:39.947897 434971 usertrap_amd64.go:225] [ 2762( 642): 2762( 642)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.948825 434971 task_exit.go:204] [ 2762( 642): 2762( 642)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.948871 434971 task_exit.go:204] [ 2762( 642): 2762( 642)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.948893 434971 task_signals.go:204] [ 2762( 642): 2766( 643)] Signal 9, PID: 2762, TID: 2766, fault addr: 0x0: terminating thread group D0318 17:09:39.948918 434971 task_exit.go:204] [ 2762( 642): 2766( 643)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.948929 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.948978 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 36 D0318 17:09:39.949291 434971 task_exit.go:204] [ 2762( 642): 2766( 643)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.949350 434971 task_exit.go:204] [ 2762( 642): 2766( 643)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.949381 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.949448 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.949864 434971 task_exit.go:204] [ 2762( 642): 2762( 642)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) D0318 17:09:39.951124 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.951171 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 37 D0318 17:09:39.951228 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.951569 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.951635 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 37 D0318 17:09:39.951839 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.952800 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.952831 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 38 D0318 17:09:39.952846 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.954540 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.954619 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 38 D0318 17:09:39.954638 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.956861 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.956885 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 39 D0318 17:09:39.956895 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.957598 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.957710 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 39 D0318 17:09:39.957771 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.958067 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.958210 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 40 D0318 17:09:39.958272 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.958344 434971 usertrap_amd64.go:212] [ 2765( 78): 2768( 79)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.958354 434971 usertrap_amd64.go:122] [ 2765( 78): 2768( 79)] Allocate a new trap: 0xc001195470 41 D0318 17:09:39.958363 434971 usertrap_amd64.go:225] [ 2765( 78): 2768( 79)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.959489 434971 usertrap_amd64.go:212] [ 2765( 78): 2765( 78)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.959521 434971 usertrap_amd64.go:122] [ 2765( 78): 2765( 78)] Allocate a new trap: 0xc001195470 42 D0318 17:09:39.959530 434971 usertrap_amd64.go:225] [ 2765( 78): 2765( 78)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.960050 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.960113 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 40 D0318 17:09:39.960126 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.960306 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.960330 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 41 D0318 17:09:39.960342 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.960548 434971 usertrap_amd64.go:212] [ 2767( 749): 2769( 750)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.960571 434971 usertrap_amd64.go:122] [ 2767( 749): 2769( 750)] Allocate a new trap: 0xc0011954a0 42 D0318 17:09:39.960582 434971 usertrap_amd64.go:225] [ 2767( 749): 2769( 750)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.960657 434971 task_exit.go:204] [ 2765( 78): 2765( 78)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.960700 434971 task_exit.go:204] [ 2765( 78): 2765( 78)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.960732 434971 task_signals.go:204] [ 2765( 78): 2768( 79)] Signal 9, PID: 2765, TID: 2768, fault addr: 0x0: terminating thread group D0318 17:09:39.960751 434971 task_exit.go:204] [ 2765( 78): 2768( 79)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.961195 434971 task_exit.go:204] [ 2765( 78): 2768( 79)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.961254 434971 task_exit.go:204] [ 2765( 78): 2768( 79)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.961270 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.961344 434971 usertrap_amd64.go:212] [ 2767( 749): 2767( 749)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.961468 434971 usertrap_amd64.go:122] [ 2767( 749): 2767( 749)] Allocate a new trap: 0xc0011954a0 43 D0318 17:09:39.961556 434971 usertrap_amd64.go:225] [ 2767( 749): 2767( 749)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.961394 434971 task_exit.go:204] [ 2765( 78): 2765( 78)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.962149 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.962222 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 39 D0318 17:09:39.962258 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.962409 434971 task_exit.go:204] [ 2767( 749): 2767( 749)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.962464 434971 task_exit.go:204] [ 2767( 749): 2767( 749)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 17:09:39 executing program 1: socket$inet_tcp(0xa, 0x1, 0x0) D0318 17:09:39.962494 434971 task_signals.go:204] [ 2767( 749): 2769( 750)] Signal 9, PID: 2767, TID: 2769, fault addr: 0x0: terminating thread group D0318 17:09:39.962547 434971 task_exit.go:204] [ 2767( 749): 2769( 750)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.962703 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.962780 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 40 D0318 17:09:39.962839 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.963072 434971 usertrap_amd64.go:212] [ 2763( 122): 2770( 123)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.963103 434971 usertrap_amd64.go:122] [ 2763( 122): 2770( 123)] Allocate a new trap: 0xc009098270 41 D0318 17:09:39.963139 434971 usertrap_amd64.go:225] [ 2763( 122): 2770( 123)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.963073 434971 task_exit.go:204] [ 2767( 749): 2769( 750)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.963187 434971 task_exit.go:204] [ 2767( 749): 2769( 750)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.963205 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.964203 434971 task_exit.go:204] [ 2767( 749): 2767( 749)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.964275 434971 usertrap_amd64.go:212] [ 2763( 122): 2763( 122)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.964371 434971 usertrap_amd64.go:122] [ 2763( 122): 2763( 122)] Allocate a new trap: 0xc009098270 42 D0318 17:09:39.964390 434971 usertrap_amd64.go:225] [ 2763( 122): 2763( 122)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) 17:09:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x24, 0x0, &(0x7f0000000200)) D0318 17:09:39.967115 434971 task_exit.go:204] [ 2763( 122): 2763( 122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.967302 434971 task_exit.go:204] [ 2763( 122): 2763( 122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.967331 434971 task_signals.go:204] [ 2763( 122): 2770( 123)] Signal 9, PID: 2763, TID: 2770, fault addr: 0x0: terminating thread group D0318 17:09:39.967359 434971 task_exit.go:204] [ 2763( 122): 2770( 123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.967664 434971 task_exit.go:204] [ 2763( 122): 2770( 123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.967696 434971 task_exit.go:204] [ 2763( 122): 2770( 123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.967713 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:39.968175 434971 task_exit.go:204] [ 2763( 122): 2763( 122)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x25, &(0x7f0000000280), 0x4) D0318 17:09:39.970292 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:39.970311 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 37 D0318 17:09:39.970388 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:39.971801 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:39.971835 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 38 D0318 17:09:39.971846 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:39.973562 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:39.973591 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 36 D0318 17:09:39.973727 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.973756 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 37 D0318 17:09:39.973822 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.973908 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:39.975056 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.975082 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:39.975093 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 38 D0318 17:09:39.975107 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.975104 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 37 D0318 17:09:39.975127 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:39.978458 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:39.978491 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 39 D0318 17:09:39.978501 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.978875 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:39.979021 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 38 D0318 17:09:39.979052 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:39.981227 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:39.981268 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 40 D0318 17:09:39.981281 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.981511 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:39.981551 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 41 D0318 17:09:39.981580 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.981644 434971 usertrap_amd64.go:212] [ 2773( 751): 2775( 752)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:39.981681 434971 usertrap_amd64.go:122] [ 2773( 751): 2775( 752)] Allocate a new trap: 0xc000b1d2c0 42 D0318 17:09:39.981694 434971 usertrap_amd64.go:225] [ 2773( 751): 2775( 752)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:39.982141 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:39.982174 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 39 D0318 17:09:39.982185 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:39.982389 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:39.982402 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 40 D0318 17:09:39.982411 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:39.982658 434971 usertrap_amd64.go:212] [ 2772( 80): 2776( 81)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:39.982677 434971 usertrap_amd64.go:122] [ 2772( 80): 2776( 81)] Allocate a new trap: 0xc0090982a0 41 D0318 17:09:39.982690 434971 usertrap_amd64.go:225] [ 2772( 80): 2776( 81)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:39.983061 434971 usertrap_amd64.go:212] [ 2773( 751): 2773( 751)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:39.983091 434971 usertrap_amd64.go:122] [ 2773( 751): 2773( 751)] Allocate a new trap: 0xc000b1d2c0 43 D0318 17:09:39.983103 434971 usertrap_amd64.go:225] [ 2773( 751): 2773( 751)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:39.983211 434971 usertrap_amd64.go:212] [ 2772( 80): 2772( 80)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:39.983262 434971 usertrap_amd64.go:122] [ 2772( 80): 2772( 80)] Allocate a new trap: 0xc0090982a0 42 D0318 17:09:39.983271 434971 usertrap_amd64.go:225] [ 2772( 80): 2772( 80)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:39.983763 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:39.983784 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 39 D0318 17:09:39.983796 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:39.984469 434971 task_exit.go:204] [ 2773( 751): 2773( 751)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.984516 434971 task_exit.go:204] [ 2773( 751): 2773( 751)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.984540 434971 task_signals.go:204] [ 2773( 751): 2775( 752)] Signal 9, PID: 2773, TID: 2775, fault addr: 0x0: terminating thread group D0318 17:09:39.984562 434971 task_exit.go:204] [ 2773( 751): 2775( 752)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.984787 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:39.984822 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 36 D0318 17:09:39.984881 434971 task_exit.go:204] [ 2773( 751): 2775( 752)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.984919 434971 task_exit.go:204] [ 2773( 751): 2775( 752)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.984937 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:39.984943 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:39.984988 434971 task_signals.go:204] [ 2772( 80): 2776( 81)] Signal 9, PID: 2772, TID: 2776, fault addr: 0x0: terminating thread group D0318 17:09:39.985029 434971 task_exit.go:204] [ 2772( 80): 2776( 81)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.985055 434971 task_exit.go:204] [ 2772( 80): 2776( 81)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.985072 434971 task_exit.go:204] [ 2772( 80): 2776( 81)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.985090 434971 task_exit.go:204] [ 2772( 80): 2772( 80)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.985462 434971 task_exit.go:204] [ 2773( 751): 2773( 751)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.985552 434971 task_exit.go:204] [ 2772( 80): 2772( 80)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.985577 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:39.986655 434971 task_exit.go:204] [ 2772( 80): 2772( 80)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.986995 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:39.987032 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 37 D0318 17:09:39.987049 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/dmi', 0x0, 0x0) lseek(r0, 0x0, 0x0) 17:09:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8901, &(0x7f0000000000)) D0318 17:09:39.988173 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:39.988205 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 40 D0318 17:09:39.988215 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:39.988416 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:39.988441 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 41 D0318 17:09:39.988451 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:39.988721 434971 usertrap_amd64.go:212] [ 2771( 644): 2777( 645)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:39.988756 434971 usertrap_amd64.go:122] [ 2771( 644): 2777( 645)] Allocate a new trap: 0xc0013bbe90 42 D0318 17:09:39.988769 434971 usertrap_amd64.go:225] [ 2771( 644): 2777( 645)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:39.989588 434971 usertrap_amd64.go:212] [ 2771( 644): 2771( 644)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:39.989632 434971 usertrap_amd64.go:122] [ 2771( 644): 2771( 644)] Allocate a new trap: 0xc0013bbe90 43 D0318 17:09:39.989644 434971 usertrap_amd64.go:225] [ 2771( 644): 2771( 644)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:39.993091 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:39.993131 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 38 D0318 17:09:39.993142 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.993392 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:39.993426 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 37 D0318 17:09:39.993433 434971 task_exit.go:204] [ 2771( 644): 2771( 644)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.993468 434971 task_exit.go:204] [ 2771( 644): 2771( 644)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.993498 434971 task_signals.go:204] [ 2771( 644): 2777( 645)] Signal 9, PID: 2771, TID: 2777, fault addr: 0x0: terminating thread group D0318 17:09:39.993555 434971 task_exit.go:204] [ 2771( 644): 2777( 645)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:39.993530 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:39.993908 434971 task_exit.go:204] [ 2771( 644): 2777( 645)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:39.993945 434971 task_exit.go:204] [ 2771( 644): 2777( 645)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:39.993958 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:39.994364 434971 task_exit.go:204] [ 2771( 644): 2771( 644)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:39 executing program 2: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) fremovexattr(r0, &(0x7f0000000080)=@random={'system.', '/\x00'}) D0318 17:09:39.995654 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:39.995682 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 38 D0318 17:09:39.995694 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:39.996659 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:39.996689 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 39 D0318 17:09:39.996699 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:39.996927 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:39.996960 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 40 D0318 17:09:39.997012 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:39.997203 434971 usertrap_amd64.go:212] [ 2774( 124): 2779( 125)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:39.997232 434971 usertrap_amd64.go:122] [ 2774( 124): 2779( 125)] Allocate a new trap: 0xc0013bbec0 41 D0318 17:09:39.997242 434971 usertrap_amd64.go:225] [ 2774( 124): 2779( 125)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:39.998791 434971 usertrap_amd64.go:212] [ 2774( 124): 2774( 124)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:39.998820 434971 usertrap_amd64.go:122] [ 2774( 124): 2774( 124)] Allocate a new trap: 0xc0013bbec0 42 D0318 17:09:39.998831 434971 usertrap_amd64.go:225] [ 2774( 124): 2774( 124)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.000660 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.000710 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 39 D0318 17:09:40.000732 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.001216 434971 task_exit.go:204] [ 2774( 124): 2774( 124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.001282 434971 task_signals.go:204] [ 2774( 124): 2779( 125)] Signal 9, PID: 2774, TID: 2779, fault addr: 0x0: terminating thread group D0318 17:09:40.001293 434971 task_exit.go:204] [ 2774( 124): 2774( 124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.001313 434971 task_exit.go:204] [ 2774( 124): 2779( 125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.001330 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.001348 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 37 D0318 17:09:40.001492 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.001619 434971 task_exit.go:204] [ 2774( 124): 2779( 125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.001637 434971 task_exit.go:204] [ 2774( 124): 2779( 125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.001656 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.002818 434971 task_exit.go:204] [ 2774( 124): 2774( 124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.003579 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.003650 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 38 D0318 17:09:40.003666 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) 17:09:40 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x4000040) D0318 17:09:40.004608 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.004641 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 40 D0318 17:09:40.004652 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.004958 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.005046 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 41 D0318 17:09:40.005123 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.005264 434971 usertrap_amd64.go:212] [ 2778( 753): 2782( 754)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.005290 434971 usertrap_amd64.go:122] [ 2778( 753): 2782( 754)] Allocate a new trap: 0xc0084c3530 42 D0318 17:09:40.005305 434971 usertrap_amd64.go:225] [ 2778( 753): 2782( 754)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.005821 434971 usertrap_amd64.go:212] [ 2778( 753): 2778( 753)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.005835 434971 usertrap_amd64.go:122] [ 2778( 753): 2778( 753)] Allocate a new trap: 0xc0084c3530 43 D0318 17:09:40.005844 434971 usertrap_amd64.go:225] [ 2778( 753): 2778( 753)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.005855 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.005874 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 36 D0318 17:09:40.006024 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.007108 434971 task_exit.go:204] [ 2778( 753): 2778( 753)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.007155 434971 task_exit.go:204] [ 2778( 753): 2778( 753)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.007185 434971 task_signals.go:204] [ 2778( 753): 2782( 754)] Signal 9, PID: 2778, TID: 2782, fault addr: 0x0: terminating thread group D0318 17:09:40.007202 434971 task_exit.go:204] [ 2778( 753): 2782( 754)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.007395 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.007448 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 37 D0318 17:09:40.007459 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.007662 434971 task_exit.go:204] [ 2778( 753): 2782( 754)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.007762 434971 task_exit.go:204] [ 2778( 753): 2782( 754)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.007887 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.008636 434971 task_exit.go:204] [ 2778( 753): 2778( 753)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x4, 0x0, &(0x7f0000000200)) D0318 17:09:40.010061 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.010078 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 39 D0318 17:09:40.010090 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.012300 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.012331 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 38 D0318 17:09:40.012343 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.014385 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.014412 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 40 D0318 17:09:40.014475 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.014909 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.014937 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 41 D0318 17:09:40.014946 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.015181 434971 usertrap_amd64.go:212] [ 2780( 646): 2784( 647)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.015215 434971 usertrap_amd64.go:122] [ 2780( 646): 2784( 647)] Allocate a new trap: 0xc0084c3560 42 D0318 17:09:40.015229 434971 usertrap_amd64.go:225] [ 2780( 646): 2784( 647)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.016296 434971 usertrap_amd64.go:212] [ 2780( 646): 2780( 646)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.016332 434971 usertrap_amd64.go:122] [ 2780( 646): 2780( 646)] Allocate a new trap: 0xc0084c3560 43 D0318 17:09:40.016343 434971 usertrap_amd64.go:225] [ 2780( 646): 2780( 646)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.016762 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.016806 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 39 D0318 17:09:40.016787 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.016825 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.016833 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 37 D0318 17:09:40.016963 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.017487 434971 usertrap_amd64.go:212] [ 2781( 82): 2786( 83)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.017515 434971 usertrap_amd64.go:122] [ 2781( 82): 2786( 83)] Allocate a new trap: 0xc000d15bc0 40 D0318 17:09:40.017526 434971 usertrap_amd64.go:225] [ 2781( 82): 2786( 83)] Apply the binary patch addr 5559c9fd1320 trap addr 66c80 ([184 17 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.017553 434971 task_exit.go:204] [ 2780( 646): 2780( 646)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.017580 434971 task_exit.go:204] [ 2780( 646): 2780( 646)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.017619 434971 task_signals.go:204] [ 2780( 646): 2784( 647)] Signal 9, PID: 2780, TID: 2784, fault addr: 0x0: terminating thread group D0318 17:09:40.017688 434971 task_exit.go:204] [ 2780( 646): 2784( 647)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.018774 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.018796 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 41 D0318 17:09:40.018807 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559c9fd1c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.019391 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.019423 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 38 D0318 17:09:40.019434 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.020079 434971 usertrap_amd64.go:212] [ 2781( 82): 2781( 82)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.020116 434971 usertrap_amd64.go:122] [ 2781( 82): 2781( 82)] Allocate a new trap: 0xc000d15bc0 42 D0318 17:09:40.020128 434971 usertrap_amd64.go:225] [ 2781( 82): 2781( 82)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.022507 434971 task_exit.go:204] [ 2781( 82): 2781( 82)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.022546 434971 task_exit.go:204] [ 2781( 82): 2781( 82)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.022564 434971 task_signals.go:204] [ 2781( 82): 2786( 83)] Signal 9, PID: 2781, TID: 2786, fault addr: 0x0: terminating thread group D0318 17:09:40.022589 434971 task_exit.go:204] [ 2781( 82): 2786( 83)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.023076 434971 task_exit.go:204] [ 2781( 82): 2786( 83)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.023098 434971 task_exit.go:204] [ 2781( 82): 2786( 83)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.023110 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.023876 434971 task_exit.go:204] [ 2780( 646): 2784( 647)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.023977 434971 task_exit.go:204] [ 2780( 646): 2784( 647)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.024018 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.024369 434971 task_exit.go:204] [ 2781( 82): 2781( 82)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) D0318 17:09:40.025204 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.025239 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 39 D0318 17:09:40.025258 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.025548 434971 task_exit.go:204] [ 2780( 646): 2780( 646)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: prctl$PR_GET_SECCOMP(0x10) D0318 17:09:40.029244 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.029277 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 36 D0318 17:09:40.029394 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.031794 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.031825 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 37 D0318 17:09:40.031840 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.032447 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.032467 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 36 D0318 17:09:40.032537 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.033979 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.034009 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 37 D0318 17:09:40.034021 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.036256 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.036292 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 40 D0318 17:09:40.036334 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.037028 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.037061 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 41 D0318 17:09:40.037073 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.037167 434971 usertrap_amd64.go:212] [ 2783( 755): 2789( 756)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.037214 434971 usertrap_amd64.go:122] [ 2783( 755): 2789( 756)] Allocate a new trap: 0xc0090982d0 42 D0318 17:09:40.037227 434971 usertrap_amd64.go:225] [ 2783( 755): 2789( 756)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.038413 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.038441 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 37 D0318 17:09:40.039002 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.039033 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 38 D0318 17:09:40.039047 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.039273 434971 usertrap_amd64.go:212] [ 2783( 755): 2783( 755)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.039302 434971 usertrap_amd64.go:122] [ 2783( 755): 2783( 755)] Allocate a new trap: 0xc0090982d0 43 D0318 17:09:40.039312 434971 usertrap_amd64.go:225] [ 2783( 755): 2783( 755)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.039376 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.039405 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 38 D0318 17:09:40.039415 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.040132 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.041307 434971 task_exit.go:204] [ 2783( 755): 2783( 755)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.041362 434971 task_exit.go:204] [ 2783( 755): 2783( 755)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.041389 434971 task_signals.go:204] [ 2783( 755): 2789( 756)] Signal 9, PID: 2783, TID: 2789, fault addr: 0x0: terminating thread group D0318 17:09:40.041405 434971 task_exit.go:204] [ 2783( 755): 2789( 756)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.041770 434971 task_exit.go:204] [ 2783( 755): 2789( 756)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.041787 434971 task_exit.go:204] [ 2783( 755): 2789( 756)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.041801 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.041872 434971 task_exit.go:204] [ 2783( 755): 2783( 755)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.042206 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.042241 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 38 D0318 17:09:40.042257 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) 17:09:40 executing program 3: add_key$user(0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffa) D0318 17:09:40.044625 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.044715 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 39 D0318 17:09:40.044742 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.045006 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.045033 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 40 D0318 17:09:40.045042 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.045055 434971 usertrap_amd64.go:212] [ 2785( 126): 2790( 127)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.045059 434971 usertrap_amd64.go:122] [ 2785( 126): 2790( 127)] Allocate a new trap: 0xc009098300 41 D0318 17:09:40.045038 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.045079 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 39 D0318 17:09:40.045097 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.045064 434971 usertrap_amd64.go:225] [ 2785( 126): 2790( 127)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.045368 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.045406 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 40 D0318 17:09:40.045420 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.045507 434971 usertrap_amd64.go:212] [ 2785( 126): 2785( 126)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.045533 434971 usertrap_amd64.go:122] [ 2785( 126): 2785( 126)] Allocate a new trap: 0xc009098300 42 D0318 17:09:40.045544 434971 usertrap_amd64.go:225] [ 2785( 126): 2785( 126)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.045618 434971 usertrap_amd64.go:212] [ 2787( 84): 2791( 85)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.045648 434971 usertrap_amd64.go:122] [ 2787( 84): 2791( 85)] Allocate a new trap: 0xc0013bbf20 41 D0318 17:09:40.045660 434971 usertrap_amd64.go:225] [ 2787( 84): 2791( 85)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.046515 434971 usertrap_amd64.go:212] [ 2787( 84): 2787( 84)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.046534 434971 usertrap_amd64.go:122] [ 2787( 84): 2787( 84)] Allocate a new trap: 0xc0013bbf20 42 D0318 17:09:40.046543 434971 usertrap_amd64.go:225] [ 2787( 84): 2787( 84)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.047823 434971 task_exit.go:204] [ 2787( 84): 2787( 84)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.047883 434971 task_exit.go:204] [ 2787( 84): 2787( 84)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.047927 434971 task_signals.go:204] [ 2787( 84): 2791( 85)] Signal 9, PID: 2787, TID: 2791, fault addr: 0x0: terminating thread group D0318 17:09:40.047942 434971 task_exit.go:204] [ 2787( 84): 2791( 85)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.048101 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.048131 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 39 D0318 17:09:40.048146 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.048323 434971 task_exit.go:204] [ 2787( 84): 2791( 85)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.048348 434971 task_exit.go:204] [ 2787( 84): 2791( 85)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.048357 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.048950 434971 task_exit.go:204] [ 2787( 84): 2787( 84)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.049569 434971 task_exit.go:204] [ 2785( 126): 2785( 126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.049617 434971 task_exit.go:204] [ 2785( 126): 2785( 126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.050384 434971 task_signals.go:204] [ 2785( 126): 2790( 127)] Signal 9, PID: 2785, TID: 2790, fault addr: 0x0: terminating thread group D0318 17:09:40.050423 434971 task_exit.go:204] [ 2785( 126): 2790( 127)] Transitioning from exit state TaskExitNone to TaskExitInitiated 17:09:40 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/dmi', 0x69c000, 0x0) D0318 17:09:40.050691 434971 task_exit.go:204] [ 2785( 126): 2790( 127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.050728 434971 task_exit.go:204] [ 2785( 126): 2790( 127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.050742 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.052073 434971 task_exit.go:204] [ 2785( 126): 2785( 126)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: syz_clone(0x41000, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 17:09:40.059564 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.059634 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 40 D0318 17:09:40.059650 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.059979 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.060007 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 41 D0318 17:09:40.060023 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.060141 434971 usertrap_amd64.go:212] [ 2788( 648): 2794( 649)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.060192 434971 usertrap_amd64.go:122] [ 2788( 648): 2794( 649)] Allocate a new trap: 0xc008058d80 42 D0318 17:09:40.060208 434971 usertrap_amd64.go:225] [ 2788( 648): 2794( 649)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.060544 434971 usertrap_amd64.go:212] [ 2788( 648): 2788( 648)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.060589 434971 usertrap_amd64.go:122] [ 2788( 648): 2788( 648)] Allocate a new trap: 0xc008058d80 43 D0318 17:09:40.060611 434971 usertrap_amd64.go:225] [ 2788( 648): 2788( 648)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.063158 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.063185 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 36 D0318 17:09:40.063349 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.063498 434971 task_exit.go:204] [ 2788( 648): 2788( 648)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.063562 434971 task_exit.go:204] [ 2788( 648): 2788( 648)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.063597 434971 task_signals.go:204] [ 2788( 648): 2794( 649)] Signal 9, PID: 2788, TID: 2794, fault addr: 0x0: terminating thread group D0318 17:09:40.063821 434971 task_exit.go:204] [ 2788( 648): 2794( 649)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.063722 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.063952 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 37 D0318 17:09:40.064087 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.064344 434971 task_exit.go:204] [ 2788( 648): 2794( 649)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.064382 434971 task_exit.go:204] [ 2788( 648): 2794( 649)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.064393 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.065048 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.065088 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 37 D0318 17:09:40.065103 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.065356 434971 task_exit.go:204] [ 2788( 648): 2788( 648)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.065774 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843e00520:sysno 266 17:09:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x801c581f, 0x0) D0318 17:09:40.065881 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 38 D0318 17:09:40.065911 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.067279 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.067317 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 36 D0318 17:09:40.067430 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.068868 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.068884 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 37 D0318 17:09:40.068894 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.071672 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.071760 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 39 D0318 17:09:40.071784 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.073508 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.073536 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 38 D0318 17:09:40.073550 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.073737 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.073765 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 38 D0318 17:09:40.073774 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.075903 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.075940 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 40 D0318 17:09:40.075956 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.076213 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.076247 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 41 D0318 17:09:40.076510 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.077100 434971 usertrap_amd64.go:212] [ 2793( 757): 2797( 758)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.077140 434971 usertrap_amd64.go:122] [ 2793( 757): 2797( 758)] Allocate a new trap: 0xc00a07a000 42 D0318 17:09:40.077176 434971 usertrap_amd64.go:225] [ 2793( 757): 2797( 758)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.077780 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.077819 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 39 D0318 17:09:40.077833 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.077872 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.077881 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 37 D0318 17:09:40.078031 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.078188 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.078221 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 40 D0318 17:09:40.078231 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.078283 434971 usertrap_amd64.go:212] [ 2792( 128): 2798( 129)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.078262 434971 usertrap_amd64.go:212] [ 2793( 757): 2793( 757)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.078304 434971 usertrap_amd64.go:122] [ 2793( 757): 2793( 757)] Allocate a new trap: 0xc00a07a000 43 D0318 17:09:40.078615 434971 usertrap_amd64.go:225] [ 2793( 757): 2793( 757)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.078289 434971 usertrap_amd64.go:122] [ 2792( 128): 2798( 129)] Allocate a new trap: 0xc009098390 41 D0318 17:09:40.078812 434971 usertrap_amd64.go:225] [ 2792( 128): 2798( 129)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.079239 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.079337 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 38 D0318 17:09:40.079361 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.079824 434971 usertrap_amd64.go:212] [ 2792( 128): 2792( 128)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.079921 434971 usertrap_amd64.go:122] [ 2792( 128): 2792( 128)] Allocate a new trap: 0xc009098390 42 D0318 17:09:40.079940 434971 usertrap_amd64.go:225] [ 2792( 128): 2792( 128)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.080037 434971 task_exit.go:204] [ 2793( 757): 2793( 757)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.080106 434971 task_exit.go:204] [ 2793( 757): 2793( 757)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.080137 434971 task_signals.go:204] [ 2793( 757): 2797( 758)] Signal 9, PID: 2793, TID: 2797, fault addr: 0x0: terminating thread group D0318 17:09:40.080154 434971 task_exit.go:204] [ 2793( 757): 2797( 758)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.080520 434971 task_exit.go:204] [ 2793( 757): 2797( 758)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.080653 434971 task_exit.go:204] [ 2793( 757): 2797( 758)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.080742 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.081734 434971 task_exit.go:204] [ 2793( 757): 2793( 757)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.081803 434971 task_signals.go:204] [ 2792( 128): 2798( 129)] Signal 9, PID: 2792, TID: 2798, fault addr: 0x0: terminating thread group D0318 17:09:40.081816 434971 task_exit.go:204] [ 2792( 128): 2792( 128)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.081871 434971 task_exit.go:204] [ 2792( 128): 2792( 128)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.081901 434971 task_exit.go:204] [ 2792( 128): 2798( 129)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.082369 434971 task_exit.go:204] [ 2792( 128): 2798( 129)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.082390 434971 task_exit.go:204] [ 2792( 128): 2798( 129)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.082414 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 17:09:40 executing program 3: add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="10", 0x1, 0xfffffffffffffffb) D0318 17:09:40.084274 434971 task_exit.go:204] [ 2792( 128): 2792( 128)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.084768 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.084798 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 39 D0318 17:09:40.084810 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) 17:09:40 executing program 0: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) D0318 17:09:40.085091 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.085111 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 40 D0318 17:09:40.085124 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.085234 434971 usertrap_amd64.go:212] [ 2795( 86): 2799( 87)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.085267 434971 usertrap_amd64.go:122] [ 2795( 86): 2799( 87)] Allocate a new trap: 0xc00a07a030 41 D0318 17:09:40.085280 434971 usertrap_amd64.go:225] [ 2795( 86): 2799( 87)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.086095 434971 usertrap_amd64.go:212] [ 2795( 86): 2795( 86)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.086116 434971 usertrap_amd64.go:122] [ 2795( 86): 2795( 86)] Allocate a new trap: 0xc00a07a030 42 D0318 17:09:40.086127 434971 usertrap_amd64.go:225] [ 2795( 86): 2795( 86)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.087553 434971 task_exit.go:204] [ 2795( 86): 2795( 86)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.087596 434971 task_exit.go:204] [ 2795( 86): 2795( 86)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.087668 434971 task_signals.go:204] [ 2795( 86): 2799( 87)] Signal 9, PID: 2795, TID: 2799, fault addr: 0x0: terminating thread group D0318 17:09:40.087697 434971 task_exit.go:204] [ 2795( 86): 2799( 87)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.088401 434971 task_exit.go:204] [ 2795( 86): 2799( 87)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.088421 434971 task_exit.go:204] [ 2795( 86): 2799( 87)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.088433 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.088897 434971 task_exit.go:204] [ 2795( 86): 2795( 86)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.090511 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.090545 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 39 D0318 17:09:40.090560 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) 17:09:40 executing program 1: add_key$user(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000001700)='dns_resolver\x00', 0x0, &(0x7f0000001780)="93de", 0x2, 0xfffffffffffffffd) D0318 17:09:40.094089 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.094129 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 40 D0318 17:09:40.094142 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.094325 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.094335 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 41 D0318 17:09:40.094343 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.094642 434971 usertrap_amd64.go:212] [ 2796( 650): 2801( 651)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.094678 434971 usertrap_amd64.go:122] [ 2796( 650): 2801( 651)] Allocate a new trap: 0xc0083c8ab0 42 D0318 17:09:40.094692 434971 usertrap_amd64.go:225] [ 2796( 650): 2801( 651)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.095265 434971 usertrap_amd64.go:212] [ 2796( 650): 2801( 651)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:40.095298 434971 usertrap_amd64.go:122] [ 2796( 650): 2801( 651)] Allocate a new trap: 0xc0083c8ab0 43 D0318 17:09:40.095313 434971 usertrap_amd64.go:225] [ 2796( 650): 2801( 651)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.099062 434971 usertrap_amd64.go:212] [ 2796( 650): 2796( 650)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.099108 434971 usertrap_amd64.go:122] [ 2796( 650): 2796( 650)] Allocate a new trap: 0xc0083c8ab0 44 D0318 17:09:40.099124 434971 usertrap_amd64.go:225] [ 2796( 650): 2796( 650)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:40.099267 434971 task_exit.go:204] [ 2796( 650): 2796( 650)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.099323 434971 task_exit.go:204] [ 2796( 650): 2796( 650)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.099351 434971 task_signals.go:204] [ 2796( 650): 2801( 651)] Signal 9, PID: 2796, TID: 2801, fault addr: 0x0: terminating thread group D0318 17:09:40.099365 434971 task_exit.go:204] [ 2796( 650): 2801( 651)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.099754 434971 task_exit.go:204] [ 2796( 650): 2801( 651)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.099832 434971 task_exit.go:204] [ 2796( 650): 2801( 651)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.099856 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.100675 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.100709 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 37 D0318 17:09:40.100919 434971 task_exit.go:204] [ 2796( 650): 2796( 650)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.101035 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty}}) D0318 17:09:40.104813 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.104849 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 38 D0318 17:09:40.104866 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.106310 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.106344 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 36 D0318 17:09:40.106464 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.107928 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.107964 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 36 D0318 17:09:40.107999 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.108023 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 37 D0318 17:09:40.108033 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.108067 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.109412 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.109443 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 39 D0318 17:09:40.109453 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.109897 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.109968 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 37 D0318 17:09:40.110002 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.112565 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.112596 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 40 D0318 17:09:40.112608 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.112849 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.112884 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 41 D0318 17:09:40.112894 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.113041 434971 usertrap_amd64.go:212] [ 2800( 759): 2804( 760)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.113075 434971 usertrap_amd64.go:122] [ 2800( 759): 2804( 760)] Allocate a new trap: 0xc0084c35f0 42 D0318 17:09:40.113087 434971 usertrap_amd64.go:225] [ 2800( 759): 2804( 760)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.113425 434971 usertrap_amd64.go:212] [ 2800( 759): 2800( 759)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.113452 434971 usertrap_amd64.go:122] [ 2800( 759): 2800( 759)] Allocate a new trap: 0xc0084c35f0 43 D0318 17:09:40.113460 434971 usertrap_amd64.go:225] [ 2800( 759): 2800( 759)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.114063 434971 task_exit.go:204] [ 2800( 759): 2800( 759)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.114118 434971 task_exit.go:204] [ 2800( 759): 2800( 759)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.114147 434971 task_signals.go:204] [ 2800( 759): 2804( 760)] Signal 9, PID: 2800, TID: 2804, fault addr: 0x0: terminating thread group D0318 17:09:40.114223 434971 task_exit.go:204] [ 2800( 759): 2804( 760)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.114958 434971 task_exit.go:204] [ 2800( 759): 2804( 760)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.114991 434971 task_exit.go:204] [ 2800( 759): 2804( 760)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.115003 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.115902 434971 task_exit.go:204] [ 2800( 759): 2800( 759)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.116903 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.116920 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 38 D0318 17:09:40.116930 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) 17:09:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x7, 0x1, 0x101, 0x50, @dev={0xfe, 0x80, '\x00', 0x40}, @private0, 0x80, 0x0, 0x3, 0x20}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x98e64597baa26a9e, 0x7, 0x37, 0x80000001, 0x38, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00', 0x40, 0x8000, 0x86f6, 0xfffff39a}}) D0318 17:09:40.121821 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.121898 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 38 D0318 17:09:40.121931 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.124836 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.124867 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 39 D0318 17:09:40.124879 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.125169 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.125294 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 40 D0318 17:09:40.125325 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.125428 434971 usertrap_amd64.go:212] [ 2803( 88): 2806( 89)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.125457 434971 usertrap_amd64.go:122] [ 2803( 88): 2806( 89)] Allocate a new trap: 0xc00a07a090 41 D0318 17:09:40.125472 434971 usertrap_amd64.go:225] [ 2803( 88): 2806( 89)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.126348 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.126372 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 37 D0318 17:09:40.126473 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.127523 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.127557 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 38 D0318 17:09:40.127568 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.127884 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.127928 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 39 D0318 17:09:40.127948 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.128400 434971 usertrap_amd64.go:212] [ 2803( 88): 2803( 88)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.128482 434971 usertrap_amd64.go:122] [ 2803( 88): 2803( 88)] Allocate a new trap: 0xc00a07a090 42 D0318 17:09:40.128514 434971 usertrap_amd64.go:225] [ 2803( 88): 2803( 88)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.128419 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.128582 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 40 D0318 17:09:40.128597 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.128635 434971 usertrap_amd64.go:212] [ 2802( 130): 2807( 131)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.128652 434971 usertrap_amd64.go:122] [ 2802( 130): 2807( 131)] Allocate a new trap: 0xc0083496e0 41 D0318 17:09:40.128659 434971 usertrap_amd64.go:225] [ 2802( 130): 2807( 131)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.129447 434971 task_exit.go:204] [ 2803( 88): 2803( 88)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.129603 434971 task_exit.go:204] [ 2803( 88): 2803( 88)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.129629 434971 usertrap_amd64.go:212] [ 2802( 130): 2802( 130)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.129696 434971 usertrap_amd64.go:122] [ 2802( 130): 2802( 130)] Allocate a new trap: 0xc0083496e0 42 D0318 17:09:40.129711 434971 task_signals.go:204] [ 2803( 88): 2806( 89)] Signal 9, PID: 2803, TID: 2806, fault addr: 0x0: terminating thread group D0318 17:09:40.129741 434971 task_exit.go:204] [ 2803( 88): 2806( 89)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.129722 434971 usertrap_amd64.go:225] [ 2802( 130): 2802( 130)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.130168 434971 task_exit.go:204] [ 2803( 88): 2806( 89)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.130205 434971 task_exit.go:204] [ 2803( 88): 2806( 89)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.130221 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.130389 434971 task_exit.go:204] [ 2803( 88): 2803( 88)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.130720 434971 task_exit.go:204] [ 2802( 130): 2802( 130)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.130845 434971 task_exit.go:204] [ 2802( 130): 2802( 130)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.130933 434971 task_signals.go:204] [ 2802( 130): 2807( 131)] Signal 9, PID: 2802, TID: 2807, fault addr: 0x0: terminating thread group D0318 17:09:40.130982 434971 task_exit.go:204] [ 2802( 130): 2807( 131)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.131334 434971 task_exit.go:204] [ 2802( 130): 2807( 131)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.131451 434971 task_exit.go:204] [ 2802( 130): 2807( 131)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.131662 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 17:09:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3, &(0x7f0000000ec0)=0x0) io_submit(r1, 0x3, &(0x7f0000001440)=[&(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x7c06, 0x0, 0x2}, 0x0, 0x0]) D0318 17:09:40.132675 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.132692 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 39 D0318 17:09:40.132707 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.132934 434971 task_exit.go:204] [ 2802( 130): 2802( 130)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/dmi', 0x4000, 0x0) D0318 17:09:40.137107 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.137154 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 40 D0318 17:09:40.137166 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.137300 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.137321 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 41 D0318 17:09:40.137331 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.137535 434971 usertrap_amd64.go:212] [ 2805( 652): 2810( 653)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.137566 434971 usertrap_amd64.go:122] [ 2805( 652): 2810( 653)] Allocate a new trap: 0xc00a07a0c0 42 D0318 17:09:40.137576 434971 usertrap_amd64.go:225] [ 2805( 652): 2810( 653)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.138304 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.138342 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 36 D0318 17:09:40.138425 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.138429 434971 usertrap_amd64.go:212] [ 2805( 652): 2805( 652)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.138583 434971 usertrap_amd64.go:122] [ 2805( 652): 2805( 652)] Allocate a new trap: 0xc00a07a0c0 43 D0318 17:09:40.138684 434971 usertrap_amd64.go:225] [ 2805( 652): 2805( 652)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.139509 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.139543 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 37 D0318 17:09:40.139553 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.139576 434971 task_exit.go:204] [ 2805( 652): 2805( 652)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.139653 434971 task_exit.go:204] [ 2805( 652): 2805( 652)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.139712 434971 task_signals.go:204] [ 2805( 652): 2810( 653)] Signal 9, PID: 2805, TID: 2810, fault addr: 0x0: terminating thread group D0318 17:09:40.139732 434971 task_exit.go:204] [ 2805( 652): 2810( 653)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.140014 434971 task_exit.go:204] [ 2805( 652): 2810( 653)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.140054 434971 task_exit.go:204] [ 2805( 652): 2810( 653)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.140065 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.140365 434971 task_exit.go:204] [ 2805( 652): 2805( 652)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.140425 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.140467 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 36 D0318 17:09:40.140544 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) 17:09:40 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/dmi', 0x0, 0x0) writev(r0, 0x0, 0xfffffffffffffea1) D0318 17:09:40.142694 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.142720 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 37 D0318 17:09:40.142740 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.144763 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.144801 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 38 D0318 17:09:40.144812 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.145944 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.145966 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 37 D0318 17:09:40.146050 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.147115 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.147147 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 38 D0318 17:09:40.147156 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.147822 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.147848 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 39 D0318 17:09:40.147859 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.148008 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.148035 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 40 D0318 17:09:40.148049 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.148236 434971 usertrap_amd64.go:212] [ 2808( 90): 2812( 91)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.148264 434971 usertrap_amd64.go:122] [ 2808( 90): 2812( 91)] Allocate a new trap: 0xc008161d10 41 D0318 17:09:40.148278 434971 usertrap_amd64.go:225] [ 2808( 90): 2812( 91)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.149079 434971 usertrap_amd64.go:212] [ 2808( 90): 2808( 90)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.149233 434971 usertrap_amd64.go:122] [ 2808( 90): 2808( 90)] Allocate a new trap: 0xc008161d10 42 D0318 17:09:40.149251 434971 usertrap_amd64.go:225] [ 2808( 90): 2808( 90)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.149858 434971 task_exit.go:204] [ 2808( 90): 2808( 90)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.149898 434971 task_exit.go:204] [ 2808( 90): 2808( 90)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.149925 434971 task_signals.go:204] [ 2808( 90): 2812( 91)] Signal 9, PID: 2808, TID: 2812, fault addr: 0x0: terminating thread group D0318 17:09:40.149940 434971 task_exit.go:204] [ 2808( 90): 2812( 91)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.150232 434971 task_exit.go:204] [ 2808( 90): 2812( 91)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.150260 434971 task_exit.go:204] [ 2808( 90): 2812( 91)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.150271 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.150461 434971 task_exit.go:204] [ 2808( 90): 2808( 90)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x2a, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:40.151425 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.151456 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 39 D0318 17:09:40.151468 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.153620 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.153657 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 40 D0318 17:09:40.153668 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.168018 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.168400 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 41 D0318 17:09:40.168459 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.168706 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.168716 434971 usertrap_amd64.go:212] [ 2811( 761): 2814( 762)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.168737 434971 usertrap_amd64.go:122] [ 2811( 761): 2814( 762)] Allocate a new trap: 0xc00a07a0f0 42 D0318 17:09:40.168751 434971 usertrap_amd64.go:225] [ 2811( 761): 2814( 762)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.168726 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 38 D0318 17:09:40.168860 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.174847 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.174957 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 36 D0318 17:09:40.175092 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.175400 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.175435 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 39 D0318 17:09:40.175448 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.175773 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.175803 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 40 D0318 17:09:40.175814 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.176039 434971 usertrap_amd64.go:212] [ 2809( 132): 2816( 133)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.176068 434971 usertrap_amd64.go:122] [ 2809( 132): 2816( 133)] Allocate a new trap: 0xc008161d40 41 D0318 17:09:40.176078 434971 usertrap_amd64.go:225] [ 2809( 132): 2816( 133)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.176689 434971 usertrap_amd64.go:212] [ 2809( 132): 2809( 132)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.176724 434971 usertrap_amd64.go:122] [ 2809( 132): 2809( 132)] Allocate a new trap: 0xc008161d40 42 D0318 17:09:40.176741 434971 usertrap_amd64.go:225] [ 2809( 132): 2809( 132)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.176858 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.176889 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 37 D0318 17:09:40.176902 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.178860 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.178891 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 37 D0318 17:09:40.180792 434971 usertrap_amd64.go:212] [ 2811( 761): 2811( 761)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.180834 434971 usertrap_amd64.go:122] [ 2811( 761): 2811( 761)] Allocate a new trap: 0xc00a07a0f0 43 D0318 17:09:40.180843 434971 usertrap_amd64.go:225] [ 2811( 761): 2811( 761)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.181182 434971 task_exit.go:204] [ 2811( 761): 2811( 761)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.181288 434971 task_exit.go:204] [ 2811( 761): 2811( 761)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.181341 434971 task_signals.go:204] [ 2811( 761): 2814( 762)] Signal 9, PID: 2811, TID: 2814, fault addr: 0x0: terminating thread group D0318 17:09:40.181359 434971 task_exit.go:204] [ 2811( 761): 2814( 762)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.181776 434971 task_exit.go:204] [ 2811( 761): 2814( 762)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.181805 434971 task_exit.go:204] [ 2811( 761): 2814( 762)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.181814 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.182290 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.182356 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 38 D0318 17:09:40.182380 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.182966 434971 task_exit.go:204] [ 2811( 761): 2811( 761)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8919, &(0x7f0000000000)) D0318 17:09:40.183766 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.188028 434971 task_exit.go:204] [ 2809( 132): 2809( 132)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.188082 434971 task_exit.go:204] [ 2809( 132): 2809( 132)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.188096 434971 task_signals.go:204] [ 2809( 132): 2816( 133)] Signal 9, PID: 2809, TID: 2816, fault addr: 0x0: terminating thread group D0318 17:09:40.188150 434971 task_exit.go:204] [ 2809( 132): 2816( 133)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.188552 434971 task_exit.go:204] [ 2809( 132): 2816( 133)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.188582 434971 task_exit.go:204] [ 2809( 132): 2816( 133)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.188597 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.188775 434971 task_exit.go:204] [ 2809( 132): 2809( 132)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: socketpair$nbd(0x1, 0x5, 0x0, &(0x7f0000000400)) D0318 17:09:40.190163 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.190198 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 39 D0318 17:09:40.190215 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.190429 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.190475 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 40 D0318 17:09:40.190491 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.190591 434971 usertrap_amd64.go:212] [ 2813( 92): 2817( 93)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.190625 434971 usertrap_amd64.go:122] [ 2813( 92): 2817( 93)] Allocate a new trap: 0xc001195530 41 D0318 17:09:40.190642 434971 usertrap_amd64.go:225] [ 2813( 92): 2817( 93)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.191807 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.191878 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 38 D0318 17:09:40.191806 434971 usertrap_amd64.go:212] [ 2813( 92): 2813( 92)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.191910 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.191916 434971 usertrap_amd64.go:122] [ 2813( 92): 2813( 92)] Allocate a new trap: 0xc001195530 42 D0318 17:09:40.191935 434971 usertrap_amd64.go:225] [ 2813( 92): 2813( 92)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.192723 434971 task_exit.go:204] [ 2813( 92): 2813( 92)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.192784 434971 task_exit.go:204] [ 2813( 92): 2813( 92)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.192808 434971 task_signals.go:204] [ 2813( 92): 2817( 93)] Signal 9, PID: 2813, TID: 2817, fault addr: 0x0: terminating thread group D0318 17:09:40.192822 434971 task_exit.go:204] [ 2813( 92): 2817( 93)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.193115 434971 task_exit.go:204] [ 2813( 92): 2817( 93)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.193143 434971 task_exit.go:204] [ 2813( 92): 2817( 93)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.193153 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.193601 434971 task_exit.go:204] [ 2813( 92): 2813( 92)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x8, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:40.206075 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.206123 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 36 D0318 17:09:40.206219 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.208536 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.208632 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 37 D0318 17:09:40.208774 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.210495 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.210532 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 38 D0318 17:09:40.210530 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.210545 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.210551 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 37 D0318 17:09:40.210566 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.216040 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.217106 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 39 D0318 17:09:40.217216 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.216311 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.217496 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 38 D0318 17:09:40.217519 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.220485 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.220521 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 39 D0318 17:09:40.220535 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.222238 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.222270 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 40 D0318 17:09:40.222280 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.222538 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.222564 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 41 D0318 17:09:40.222574 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.222596 434971 usertrap_amd64.go:212] [ 2819( 763): 2821( 764)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.222601 434971 usertrap_amd64.go:122] [ 2819( 763): 2821( 764)] Allocate a new trap: 0xc0083c8000 42 D0318 17:09:40.222610 434971 usertrap_amd64.go:225] [ 2819( 763): 2821( 764)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.222934 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.222952 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 40 D0318 17:09:40.222962 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.223140 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.223228 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 41 D0318 17:09:40.223333 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.223722 434971 usertrap_amd64.go:212] [ 2819( 763): 2819( 763)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.223739 434971 usertrap_amd64.go:122] [ 2819( 763): 2819( 763)] Allocate a new trap: 0xc0083c8000 43 D0318 17:09:40.223747 434971 usertrap_amd64.go:225] [ 2819( 763): 2819( 763)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.223974 434971 usertrap_amd64.go:212] [ 2815( 654): 2822( 655)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.224007 434971 usertrap_amd64.go:122] [ 2815( 654): 2822( 655)] Allocate a new trap: 0xc000b1c000 42 D0318 17:09:40.224022 434971 usertrap_amd64.go:225] [ 2815( 654): 2822( 655)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.224639 434971 usertrap_amd64.go:212] [ 2815( 654): 2815( 654)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.224669 434971 usertrap_amd64.go:122] [ 2815( 654): 2815( 654)] Allocate a new trap: 0xc000b1c000 43 D0318 17:09:40.224679 434971 usertrap_amd64.go:225] [ 2815( 654): 2815( 654)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.225519 434971 task_exit.go:204] [ 2815( 654): 2815( 654)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.225648 434971 task_signals.go:204] [ 2815( 654): 2822( 655)] Signal 9, PID: 2815, TID: 2822, fault addr: 0x0: terminating thread group D0318 17:09:40.225736 434971 task_exit.go:204] [ 2815( 654): 2815( 654)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.225818 434971 task_exit.go:204] [ 2815( 654): 2822( 655)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.225893 434971 task_exit.go:204] [ 2819( 763): 2819( 763)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.225942 434971 task_exit.go:204] [ 2819( 763): 2819( 763)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.225967 434971 task_signals.go:204] [ 2819( 763): 2821( 764)] Signal 9, PID: 2819, TID: 2821, fault addr: 0x0: terminating thread group D0318 17:09:40.225987 434971 task_exit.go:204] [ 2819( 763): 2821( 764)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.226306 434971 task_exit.go:204] [ 2819( 763): 2821( 764)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.226338 434971 task_exit.go:204] [ 2819( 763): 2821( 764)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.226350 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.226609 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.226628 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 39 D0318 17:09:40.226645 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.226662 434971 task_exit.go:204] [ 2815( 654): 2822( 655)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.226684 434971 task_exit.go:204] [ 2815( 654): 2822( 655)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.226699 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.226804 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.226834 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 40 D0318 17:09:40.226844 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.226921 434971 usertrap_amd64.go:212] [ 2818( 134): 2823( 135)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.226959 434971 usertrap_amd64.go:122] [ 2818( 134): 2823( 135)] Allocate a new trap: 0xc000b1c060 41 D0318 17:09:40.227012 434971 task_exit.go:204] [ 2819( 763): 2819( 763)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.226970 434971 usertrap_amd64.go:225] [ 2818( 134): 2823( 135)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.227798 434971 task_exit.go:204] [ 2815( 654): 2815( 654)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.228342 434971 usertrap_amd64.go:212] [ 2818( 134): 2818( 134)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.228372 434971 usertrap_amd64.go:122] [ 2818( 134): 2818( 134)] Allocate a new trap: 0xc000b1c060 42 D0318 17:09:40.228382 434971 usertrap_amd64.go:225] [ 2818( 134): 2818( 134)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0xd, &(0x7f0000000280), 0x4) 17:09:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80811501, 0x0) D0318 17:09:40.230855 434971 task_exit.go:204] [ 2818( 134): 2818( 134)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.230899 434971 task_exit.go:204] [ 2818( 134): 2818( 134)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.230895 434971 task_signals.go:204] [ 2818( 134): 2823( 135)] Signal 9, PID: 2818, TID: 2823, fault addr: 0x0: terminating thread group D0318 17:09:40.230925 434971 task_exit.go:204] [ 2818( 134): 2823( 135)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.231219 434971 task_exit.go:204] [ 2818( 134): 2823( 135)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.231239 434971 task_exit.go:204] [ 2818( 134): 2823( 135)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.231251 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.235025 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.235066 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 36 D0318 17:09:40.235265 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.236955 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.236993 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 37 D0318 17:09:40.237059 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.238083 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.238118 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 38 D0318 17:09:40.238192 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.238844 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.238893 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 37 D0318 17:09:40.239031 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.239069 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 37 D0318 17:09:40.239083 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.239325 434971 task_exit.go:204] [ 2818( 134): 2818( 134)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.239553 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:40 executing program 0: pipe2$watch_queue(&(0x7f0000000640), 0x80) D0318 17:09:40.242669 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.242694 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 39 D0318 17:09:40.242705 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.242890 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.242927 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 38 D0318 17:09:40.242953 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.244425 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.244453 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 38 D0318 17:09:40.244465 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.244821 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.244853 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 40 D0318 17:09:40.244865 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.245134 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.245167 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 41 D0318 17:09:40.245177 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.245414 434971 usertrap_amd64.go:212] [ 2824( 656): 2826( 657)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.245446 434971 usertrap_amd64.go:122] [ 2824( 656): 2826( 657)] Allocate a new trap: 0xc001194090 42 D0318 17:09:40.245461 434971 usertrap_amd64.go:225] [ 2824( 656): 2826( 657)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.246255 434971 usertrap_amd64.go:212] [ 2824( 656): 2826( 657)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:40.246291 434971 usertrap_amd64.go:122] [ 2824( 656): 2826( 657)] Allocate a new trap: 0xc001194090 43 D0318 17:09:40.246301 434971 usertrap_amd64.go:225] [ 2824( 656): 2826( 657)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.248448 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.248466 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 39 D0318 17:09:40.248477 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.249066 434971 usertrap_amd64.go:212] [ 2824( 656): 2824( 656)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.249101 434971 usertrap_amd64.go:122] [ 2824( 656): 2824( 656)] Allocate a new trap: 0xc001194090 44 D0318 17:09:40.249137 434971 usertrap_amd64.go:225] [ 2824( 656): 2824( 656)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:40.249303 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.249330 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 39 D0318 17:09:40.249341 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.249474 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.249497 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 40 D0318 17:09:40.249505 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.249732 434971 task_exit.go:204] [ 2824( 656): 2824( 656)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.249784 434971 task_exit.go:204] [ 2824( 656): 2824( 656)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.249800 434971 usertrap_amd64.go:212] [ 2820( 94): 2827( 95)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.249817 434971 usertrap_amd64.go:122] [ 2820( 94): 2827( 95)] Allocate a new trap: 0xc000576000 41 D0318 17:09:40.249827 434971 usertrap_amd64.go:225] [ 2820( 94): 2827( 95)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.249822 434971 task_signals.go:204] [ 2824( 656): 2826( 657)] Signal 9, PID: 2824, TID: 2826, fault addr: 0x0: terminating thread group D0318 17:09:40.249843 434971 task_exit.go:204] [ 2824( 656): 2826( 657)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.250319 434971 task_exit.go:204] [ 2824( 656): 2826( 657)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.250351 434971 task_exit.go:204] [ 2824( 656): 2826( 657)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.250366 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.251745 434971 task_exit.go:204] [ 2824( 656): 2824( 656)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.252515 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.252548 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 40 D0318 17:09:40.252562 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.252942 434971 usertrap_amd64.go:212] [ 2820( 94): 2820( 94)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.252972 434971 usertrap_amd64.go:122] [ 2820( 94): 2820( 94)] Allocate a new trap: 0xc000576000 42 D0318 17:09:40.252983 434971 usertrap_amd64.go:225] [ 2820( 94): 2820( 94)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.252961 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.253072 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 41 D0318 17:09:40.253087 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.253210 434971 usertrap_amd64.go:212] [ 2825( 765): 2828( 766)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.253245 434971 usertrap_amd64.go:122] [ 2825( 765): 2828( 766)] Allocate a new trap: 0xc008058090 42 D0318 17:09:40.253274 434971 usertrap_amd64.go:225] [ 2825( 765): 2828( 766)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="f5", 0x1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) D0318 17:09:40.254387 434971 usertrap_amd64.go:212] [ 2825( 765): 2825( 765)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.254404 434971 usertrap_amd64.go:122] [ 2825( 765): 2825( 765)] Allocate a new trap: 0xc008058090 43 D0318 17:09:40.254414 434971 usertrap_amd64.go:225] [ 2825( 765): 2825( 765)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.255187 434971 task_exit.go:204] [ 2825( 765): 2825( 765)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.255243 434971 task_signals.go:204] [ 2825( 765): 2828( 766)] Signal 9, PID: 2825, TID: 2828, fault addr: 0x0: terminating thread group D0318 17:09:40.255261 434971 task_exit.go:204] [ 2825( 765): 2825( 765)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.255275 434971 task_exit.go:204] [ 2825( 765): 2828( 766)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.255696 434971 task_exit.go:204] [ 2825( 765): 2828( 766)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.255770 434971 task_exit.go:204] [ 2825( 765): 2828( 766)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.255785 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.256291 434971 task_exit.go:204] [ 2825( 765): 2825( 765)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x9, 0x0, &(0x7f0000000200)) D0318 17:09:40.261387 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.261408 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 36 D0318 17:09:40.261512 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.262763 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.262791 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 37 D0318 17:09:40.262802 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.263794 434971 task_exit.go:204] [ 2820( 94): 2820( 94)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.263850 434971 task_exit.go:204] [ 2820( 94): 2820( 94)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.263961 434971 task_signals.go:204] [ 2820( 94): 2827( 95)] Signal 9, PID: 2820, TID: 2827, fault addr: 0x0: terminating thread group D0318 17:09:40.264077 434971 task_exit.go:204] [ 2820( 94): 2827( 95)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.264505 434971 task_exit.go:204] [ 2820( 94): 2827( 95)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.264577 434971 task_exit.go:204] [ 2820( 94): 2827( 95)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.264620 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.265525 434971 task_exit.go:204] [ 2820( 94): 2820( 94)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.265549 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.265562 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 37 D0318 17:09:40.265708 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x6, 0x4) D0318 17:09:40.268920 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.268957 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 38 D0318 17:09:40.268974 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.269932 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.269970 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 38 D0318 17:09:40.269982 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.273163 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.273261 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 36 D0318 17:09:40.273367 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.273457 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.273490 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 39 D0318 17:09:40.273501 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.273694 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.273733 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 40 D0318 17:09:40.273749 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.273925 434971 usertrap_amd64.go:212] [ 2829( 136): 2833( 137)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.273956 434971 usertrap_amd64.go:122] [ 2829( 136): 2833( 137)] Allocate a new trap: 0xc000576030 41 D0318 17:09:40.273965 434971 usertrap_amd64.go:225] [ 2829( 136): 2833( 137)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.274414 434971 usertrap_amd64.go:212] [ 2829( 136): 2829( 136)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.274492 434971 usertrap_amd64.go:122] [ 2829( 136): 2829( 136)] Allocate a new trap: 0xc000576030 42 D0318 17:09:40.274588 434971 usertrap_amd64.go:225] [ 2829( 136): 2829( 136)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.274723 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.274756 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 37 D0318 17:09:40.274766 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.275661 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.275692 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 39 D0318 17:09:40.275703 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.278742 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.278827 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 37 D0318 17:09:40.278920 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.279476 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.279506 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 38 D0318 17:09:40.279517 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.280815 434971 task_exit.go:204] [ 2829( 136): 2829( 136)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.280870 434971 task_exit.go:204] [ 2829( 136): 2829( 136)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.280897 434971 task_signals.go:204] [ 2829( 136): 2833( 137)] Signal 9, PID: 2829, TID: 2833, fault addr: 0x0: terminating thread group D0318 17:09:40.280942 434971 task_exit.go:204] [ 2829( 136): 2833( 137)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.281219 434971 task_exit.go:204] [ 2829( 136): 2833( 137)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.281253 434971 task_exit.go:204] [ 2829( 136): 2833( 137)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.281264 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.281903 434971 task_exit.go:204] [ 2829( 136): 2829( 136)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff}, 0x80) fremovexattr(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="631148634e967e071af026e8c9c598b05bf74f79e2e6adb3"]) D0318 17:09:40.283917 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.284060 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 39 D0318 17:09:40.284094 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.283923 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.284197 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 38 D0318 17:09:40.284215 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.284942 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.284970 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 40 D0318 17:09:40.284981 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.285322 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.285348 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 41 D0318 17:09:40.285357 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.285674 434971 usertrap_amd64.go:212] [ 2830( 658): 2834( 659)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.285704 434971 usertrap_amd64.go:122] [ 2830( 658): 2834( 659)] Allocate a new trap: 0xc000d14060 42 D0318 17:09:40.285719 434971 usertrap_amd64.go:225] [ 2830( 658): 2834( 659)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.288205 434971 usertrap_amd64.go:212] [ 2830( 658): 2830( 658)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.288287 434971 usertrap_amd64.go:122] [ 2830( 658): 2830( 658)] Allocate a new trap: 0xc000d14060 43 D0318 17:09:40.288353 434971 usertrap_amd64.go:225] [ 2830( 658): 2830( 658)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.288436 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.288467 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 40 D0318 17:09:40.288480 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.288673 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.288710 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 41 D0318 17:09:40.288721 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.289042 434971 usertrap_amd64.go:212] [ 2831( 767): 2835( 768)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.289070 434971 usertrap_amd64.go:122] [ 2831( 767): 2835( 768)] Allocate a new trap: 0xc000d14090 42 D0318 17:09:40.289081 434971 usertrap_amd64.go:225] [ 2831( 767): 2835( 768)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.289698 434971 task_exit.go:204] [ 2830( 658): 2830( 658)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.289756 434971 task_exit.go:204] [ 2830( 658): 2830( 658)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.289789 434971 task_signals.go:204] [ 2830( 658): 2834( 659)] Signal 9, PID: 2830, TID: 2834, fault addr: 0x0: terminating thread group D0318 17:09:40.289822 434971 task_exit.go:204] [ 2830( 658): 2834( 659)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.290331 434971 usertrap_amd64.go:212] [ 2831( 767): 2831( 767)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.290363 434971 usertrap_amd64.go:122] [ 2831( 767): 2831( 767)] Allocate a new trap: 0xc000d14090 43 D0318 17:09:40.290375 434971 usertrap_amd64.go:225] [ 2831( 767): 2831( 767)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.290584 434971 task_exit.go:204] [ 2830( 658): 2834( 659)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.290647 434971 task_exit.go:204] [ 2830( 658): 2834( 659)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.290662 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.291375 434971 task_exit.go:204] [ 2831( 767): 2831( 767)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.291433 434971 task_exit.go:204] [ 2831( 767): 2831( 767)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.291466 434971 task_signals.go:204] [ 2831( 767): 2835( 768)] Signal 9, PID: 2831, TID: 2835, fault addr: 0x0: terminating thread group D0318 17:09:40.291498 434971 task_exit.go:204] [ 2831( 767): 2835( 768)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.291693 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.291769 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 39 D0318 17:09:40.291724 434971 task_exit.go:204] [ 2830( 658): 2830( 658)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.291797 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.291992 434971 task_exit.go:204] [ 2831( 767): 2835( 768)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.292017 434971 task_exit.go:204] [ 2831( 767): 2835( 768)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.292038 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.292124 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.292149 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 40 D0318 17:09:40.292174 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.292203 434971 usertrap_amd64.go:212] [ 2832( 96): 2837( 97)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.292219 434971 usertrap_amd64.go:122] [ 2832( 96): 2837( 97)] Allocate a new trap: 0xc008058120 41 D0318 17:09:40.292228 434971 usertrap_amd64.go:225] [ 2832( 96): 2837( 97)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.292317 434971 task_exit.go:204] [ 2831( 767): 2831( 767)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @dev}}) 17:09:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x4030582b, 0x0) D0318 17:09:40.293591 434971 usertrap_amd64.go:212] [ 2832( 96): 2832( 96)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.293627 434971 usertrap_amd64.go:122] [ 2832( 96): 2832( 96)] Allocate a new trap: 0xc008058120 42 D0318 17:09:40.293639 434971 usertrap_amd64.go:225] [ 2832( 96): 2832( 96)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.294639 434971 task_exit.go:204] [ 2832( 96): 2832( 96)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.294685 434971 task_exit.go:204] [ 2832( 96): 2832( 96)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.294934 434971 task_signals.go:204] [ 2832( 96): 2837( 97)] Signal 9, PID: 2832, TID: 2837, fault addr: 0x0: terminating thread group D0318 17:09:40.294970 434971 task_exit.go:204] [ 2832( 96): 2837( 97)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.295292 434971 task_exit.go:204] [ 2832( 96): 2837( 97)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.295319 434971 task_exit.go:204] [ 2832( 96): 2837( 97)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.295329 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.296141 434971 task_exit.go:204] [ 2832( 96): 2832( 96)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.296228 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.296257 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 36 D0318 17:09:40.296354 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.297642 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.297672 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 37 D0318 17:09:40.297687 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.302495 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.302525 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 38 D0318 17:09:40.302536 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:40 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/dmi', 0x0, 0x0) lseek(r0, 0x5, 0x0) D0318 17:09:40.310511 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.310572 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 37 D0318 17:09:40.310679 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.312157 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.312200 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 36 D0318 17:09:40.312275 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.312323 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.312373 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 38 D0318 17:09:40.312389 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.313922 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.313937 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.313958 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 37 D0318 17:09:40.313968 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.313945 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 39 D0318 17:09:40.314051 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.314599 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.314715 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 40 D0318 17:09:40.314781 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.315132 434971 usertrap_amd64.go:212] [ 2836( 138): 2841( 139)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.315160 434971 usertrap_amd64.go:122] [ 2836( 138): 2841( 139)] Allocate a new trap: 0xc001596030 41 D0318 17:09:40.315173 434971 usertrap_amd64.go:225] [ 2836( 138): 2841( 139)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.316758 434971 usertrap_amd64.go:212] [ 2836( 138): 2836( 138)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.316792 434971 usertrap_amd64.go:122] [ 2836( 138): 2836( 138)] Allocate a new trap: 0xc001596030 42 D0318 17:09:40.316803 434971 usertrap_amd64.go:225] [ 2836( 138): 2836( 138)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.318452 434971 task_exit.go:204] [ 2836( 138): 2836( 138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.318499 434971 task_exit.go:204] [ 2836( 138): 2836( 138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.318563 434971 task_signals.go:204] [ 2836( 138): 2841( 139)] Signal 9, PID: 2836, TID: 2841, fault addr: 0x0: terminating thread group D0318 17:09:40.318607 434971 task_exit.go:204] [ 2836( 138): 2841( 139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.318975 434971 task_exit.go:204] [ 2836( 138): 2841( 139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.319003 434971 task_exit.go:204] [ 2836( 138): 2841( 139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.319016 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.319759 434971 task_exit.go:204] [ 2836( 138): 2836( 138)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.319947 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.320027 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 38 D0318 17:09:40.320307 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) 17:09:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xffffff25, @link_local}, 0x10) D0318 17:09:40.321235 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.321327 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 39 D0318 17:09:40.321393 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.322278 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.322314 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 37 D0318 17:09:40.322397 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.326401 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.326439 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 39 D0318 17:09:40.326454 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.326802 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.326838 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 40 D0318 17:09:40.326850 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.327085 434971 usertrap_amd64.go:212] [ 2839( 98): 2843( 99)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.327176 434971 usertrap_amd64.go:122] [ 2839( 98): 2843( 99)] Allocate a new trap: 0xc0090980c0 41 D0318 17:09:40.327196 434971 usertrap_amd64.go:225] [ 2839( 98): 2843( 99)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.327966 434971 usertrap_amd64.go:212] [ 2839( 98): 2839( 98)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.327997 434971 usertrap_amd64.go:122] [ 2839( 98): 2839( 98)] Allocate a new trap: 0xc0090980c0 42 D0318 17:09:40.328008 434971 usertrap_amd64.go:225] [ 2839( 98): 2839( 98)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.328638 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.328676 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 40 D0318 17:09:40.328693 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.328906 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.328936 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 41 D0318 17:09:40.328946 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.329091 434971 usertrap_amd64.go:212] [ 2838( 660): 2844( 661)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.329120 434971 usertrap_amd64.go:122] [ 2838( 660): 2844( 661)] Allocate a new trap: 0xc00a07a000 42 D0318 17:09:40.329173 434971 usertrap_amd64.go:225] [ 2838( 660): 2844( 661)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.329970 434971 usertrap_amd64.go:212] [ 2838( 660): 2838( 660)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.330049 434971 usertrap_amd64.go:122] [ 2838( 660): 2838( 660)] Allocate a new trap: 0xc00a07a000 43 D0318 17:09:40.330157 434971 usertrap_amd64.go:225] [ 2838( 660): 2838( 660)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.330377 434971 task_exit.go:204] [ 2839( 98): 2839( 98)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.330475 434971 task_exit.go:204] [ 2839( 98): 2839( 98)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.330504 434971 task_signals.go:204] [ 2839( 98): 2843( 99)] Signal 9, PID: 2839, TID: 2843, fault addr: 0x0: terminating thread group D0318 17:09:40.330520 434971 task_exit.go:204] [ 2839( 98): 2843( 99)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.330978 434971 task_exit.go:204] [ 2839( 98): 2843( 99)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.330999 434971 task_exit.go:204] [ 2839( 98): 2843( 99)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.331050 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.331109 434971 task_exit.go:204] [ 2839( 98): 2839( 98)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: add_key(&(0x7f0000001700)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) D0318 17:09:40.331920 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.331962 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 38 D0318 17:09:40.331974 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.331990 434971 task_exit.go:204] [ 2838( 660): 2838( 660)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.332031 434971 task_exit.go:204] [ 2838( 660): 2838( 660)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.332111 434971 task_signals.go:204] [ 2838( 660): 2844( 661)] Signal 9, PID: 2838, TID: 2844, fault addr: 0x0: terminating thread group D0318 17:09:40.332146 434971 task_exit.go:204] [ 2838( 660): 2844( 661)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.332833 434971 task_exit.go:204] [ 2838( 660): 2844( 661)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.332868 434971 task_exit.go:204] [ 2838( 660): 2844( 661)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.332888 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.333161 434971 task_exit.go:204] [ 2838( 660): 2838( 660)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0x1, 0x4) D0318 17:09:40.334786 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.334830 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 36 D0318 17:09:40.335008 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.336799 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.336835 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 37 D0318 17:09:40.336849 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.337500 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.337536 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 39 D0318 17:09:40.337552 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.339823 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.339918 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 40 D0318 17:09:40.340000 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.340353 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.340383 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 41 D0318 17:09:40.340399 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.340427 434971 usertrap_amd64.go:212] [ 2840( 769): 2846( 770)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.340509 434971 usertrap_amd64.go:122] [ 2840( 769): 2846( 770)] Allocate a new trap: 0xc0083c8060 42 D0318 17:09:40.340521 434971 usertrap_amd64.go:225] [ 2840( 769): 2846( 770)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.341691 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.341785 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 36 D0318 17:09:40.342017 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.343275 434971 usertrap_amd64.go:212] [ 2840( 769): 2846( 770)] Found the pattern at ip 555843dff999:sysno 257 D0318 17:09:40.343306 434971 usertrap_amd64.go:122] [ 2840( 769): 2846( 770)] Allocate a new trap: 0xc0083c8060 43 D0318 17:09:40.343316 434971 usertrap_amd64.go:225] [ 2840( 769): 2846( 770)] Apply the binary patch addr 555843dff999 trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.343552 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.343731 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 37 D0318 17:09:40.343763 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.344374 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.344395 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 38 D0318 17:09:40.344408 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.344949 434971 usertrap_amd64.go:212] [ 2840( 769): 2840( 769)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.344966 434971 usertrap_amd64.go:122] [ 2840( 769): 2840( 769)] Allocate a new trap: 0xc0083c8060 44 D0318 17:09:40.344977 434971 usertrap_amd64.go:225] [ 2840( 769): 2840( 769)] Apply the binary patch addr 555843dffc93 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0318 17:09:40.345175 434971 task_exit.go:204] [ 2840( 769): 2840( 769)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.345204 434971 task_exit.go:204] [ 2840( 769): 2840( 769)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.345674 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.345691 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 37 D0318 17:09:40.345848 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.345250 434971 task_signals.go:204] [ 2840( 769): 2846( 770)] Signal 9, PID: 2840, TID: 2846, fault addr: 0x0: terminating thread group D0318 17:09:40.346522 434971 task_exit.go:204] [ 2840( 769): 2846( 770)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.346818 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.346890 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 38 D0318 17:09:40.347042 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.348754 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.348832 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 39 D0318 17:09:40.348881 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.349217 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.349256 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 40 D0318 17:09:40.349268 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.349462 434971 usertrap_amd64.go:212] [ 2842( 140): 2848( 141)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.349497 434971 usertrap_amd64.go:122] [ 2842( 140): 2848( 141)] Allocate a new trap: 0xc00a07a030 41 D0318 17:09:40.349511 434971 usertrap_amd64.go:225] [ 2842( 140): 2848( 141)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.350853 434971 usertrap_amd64.go:212] [ 2842( 140): 2842( 140)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.350889 434971 usertrap_amd64.go:122] [ 2842( 140): 2842( 140)] Allocate a new trap: 0xc00a07a030 42 D0318 17:09:40.350904 434971 usertrap_amd64.go:225] [ 2842( 140): 2842( 140)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.352086 434971 task_exit.go:204] [ 2842( 140): 2842( 140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.352141 434971 task_exit.go:204] [ 2842( 140): 2842( 140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.352173 434971 task_signals.go:204] [ 2842( 140): 2848( 141)] Signal 9, PID: 2842, TID: 2848, fault addr: 0x0: terminating thread group D0318 17:09:40.352280 434971 task_exit.go:204] [ 2842( 140): 2848( 141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.352670 434971 task_exit.go:204] [ 2842( 140): 2848( 141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.352684 434971 task_exit.go:204] [ 2842( 140): 2848( 141)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.352696 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.353647 434971 task_exit.go:204] [ 2842( 140): 2842( 140)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x14) D0318 17:09:40.355508 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.355528 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 39 D0318 17:09:40.355540 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.357880 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.357901 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 38 D0318 17:09:40.357915 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.360296 434971 task_exit.go:204] [ 2840( 769): 2846( 770)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.360435 434971 task_exit.go:204] [ 2840( 769): 2846( 770)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.360465 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.361510 434971 task_exit.go:204] [ 2840( 769): 2840( 769)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8935, &(0x7f0000000000)) D0318 17:09:40.368233 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.368295 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 39 D0318 17:09:40.368328 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.368584 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.368622 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 40 D0318 17:09:40.368638 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.368911 434971 usertrap_amd64.go:212] [ 2845( 100): 2850( 101)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.368959 434971 usertrap_amd64.go:122] [ 2845( 100): 2850( 101)] Allocate a new trap: 0xc001596090 41 D0318 17:09:40.368975 434971 usertrap_amd64.go:225] [ 2845( 100): 2850( 101)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.370895 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.371068 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 36 D0318 17:09:40.371193 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.373512 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.373538 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 37 D0318 17:09:40.373563 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.374742 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.374779 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 40 D0318 17:09:40.374793 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.375019 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.375048 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 41 D0318 17:09:40.375073 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.375723 434971 usertrap_amd64.go:212] [ 2847( 662): 2851( 663)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.375757 434971 usertrap_amd64.go:122] [ 2847( 662): 2851( 663)] Allocate a new trap: 0xc0015960c0 42 D0318 17:09:40.375771 434971 usertrap_amd64.go:225] [ 2847( 662): 2851( 663)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.376446 434971 usertrap_amd64.go:212] [ 2845( 100): 2845( 100)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.376476 434971 usertrap_amd64.go:122] [ 2845( 100): 2845( 100)] Allocate a new trap: 0xc001596090 42 D0318 17:09:40.376492 434971 usertrap_amd64.go:225] [ 2845( 100): 2845( 100)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.376547 434971 usertrap_amd64.go:212] [ 2847( 662): 2847( 662)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.376584 434971 usertrap_amd64.go:122] [ 2847( 662): 2847( 662)] Allocate a new trap: 0xc0015960c0 43 D0318 17:09:40.376625 434971 usertrap_amd64.go:225] [ 2847( 662): 2847( 662)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.377737 434971 task_exit.go:204] [ 2845( 100): 2845( 100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.377795 434971 task_exit.go:204] [ 2845( 100): 2845( 100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.377798 434971 task_signals.go:204] [ 2845( 100): 2850( 101)] Signal 9, PID: 2845, TID: 2850, fault addr: 0x0: terminating thread group D0318 17:09:40.377824 434971 task_exit.go:204] [ 2845( 100): 2850( 101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.378030 434971 task_exit.go:204] [ 2847( 662): 2847( 662)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.378097 434971 task_exit.go:204] [ 2847( 662): 2847( 662)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.378143 434971 task_signals.go:204] [ 2847( 662): 2851( 663)] Signal 9, PID: 2847, TID: 2851, fault addr: 0x0: terminating thread group D0318 17:09:40.378161 434971 task_exit.go:204] [ 2847( 662): 2851( 663)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.378185 434971 task_exit.go:204] [ 2845( 100): 2850( 101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.378221 434971 task_exit.go:204] [ 2845( 100): 2850( 101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.378235 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.378486 434971 task_exit.go:204] [ 2845( 100): 2845( 100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.379001 434971 task_exit.go:204] [ 2847( 662): 2851( 663)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.379090 434971 task_exit.go:204] [ 2847( 662): 2851( 663)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.379126 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1e, 0x0, &(0x7f0000000200)) D0318 17:09:40.380120 434971 task_exit.go:204] [ 2847( 662): 2847( 662)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80111500, 0x0) D0318 17:09:40.380920 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.380939 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 38 D0318 17:09:40.380950 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.385346 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.385365 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 39 D0318 17:09:40.385374 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.385674 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.385707 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 40 D0318 17:09:40.385726 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.385876 434971 usertrap_amd64.go:212] [ 2849( 142): 2852( 143)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.385914 434971 usertrap_amd64.go:122] [ 2849( 142): 2852( 143)] Allocate a new trap: 0xc008058150 41 D0318 17:09:40.385927 434971 usertrap_amd64.go:225] [ 2849( 142): 2852( 143)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.386930 434971 usertrap_amd64.go:212] [ 2849( 142): 2849( 142)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.386962 434971 usertrap_amd64.go:122] [ 2849( 142): 2849( 142)] Allocate a new trap: 0xc008058150 42 D0318 17:09:40.386975 434971 usertrap_amd64.go:225] [ 2849( 142): 2849( 142)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.389142 434971 task_exit.go:204] [ 2849( 142): 2849( 142)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.389191 434971 task_exit.go:204] [ 2849( 142): 2849( 142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.389215 434971 task_signals.go:204] [ 2849( 142): 2852( 143)] Signal 9, PID: 2849, TID: 2852, fault addr: 0x0: terminating thread group D0318 17:09:40.389233 434971 task_exit.go:204] [ 2849( 142): 2852( 143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.389554 434971 task_exit.go:204] [ 2849( 142): 2852( 143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.389584 434971 task_exit.go:204] [ 2849( 142): 2852( 143)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.389595 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.391358 434971 task_exit.go:204] [ 2849( 142): 2849( 142)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000740)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) D0318 17:09:40.396227 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.396275 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 37 D0318 17:09:40.396416 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.397679 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.397718 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 38 D0318 17:09:40.397731 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.400762 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.400803 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 37 D0318 17:09:40.402578 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.403432 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.403469 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 39 D0318 17:09:40.403485 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.404160 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.404178 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 38 D0318 17:09:40.404191 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.406188 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.406226 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 40 D0318 17:09:40.406238 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.406594 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.406628 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 41 D0318 17:09:40.406642 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.406742 434971 usertrap_amd64.go:212] [ 2853( 771): 2857( 772)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.406774 434971 usertrap_amd64.go:122] [ 2853( 771): 2857( 772)] Allocate a new trap: 0xc008348000 42 D0318 17:09:40.406788 434971 usertrap_amd64.go:225] [ 2853( 771): 2857( 772)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.406921 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.407010 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 36 D0318 17:09:40.407177 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.407413 434971 usertrap_amd64.go:212] [ 2853( 771): 2853( 771)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.407448 434971 usertrap_amd64.go:122] [ 2853( 771): 2853( 771)] Allocate a new trap: 0xc008348000 43 D0318 17:09:40.407462 434971 usertrap_amd64.go:225] [ 2853( 771): 2853( 771)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.408013 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.408054 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 36 D0318 17:09:40.408133 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.408288 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.408319 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 37 D0318 17:09:40.408337 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.409051 434971 task_exit.go:204] [ 2853( 771): 2853( 771)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.409114 434971 task_exit.go:204] [ 2853( 771): 2853( 771)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.409148 434971 task_signals.go:204] [ 2853( 771): 2857( 772)] Signal 9, PID: 2853, TID: 2857, fault addr: 0x0: terminating thread group D0318 17:09:40.409161 434971 task_exit.go:204] [ 2853( 771): 2857( 772)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.409579 434971 task_exit.go:204] [ 2853( 771): 2857( 772)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.409678 434971 task_exit.go:204] [ 2853( 771): 2857( 772)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.409767 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.410702 434971 task_exit.go:204] [ 2853( 771): 2853( 771)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.410778 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.410791 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 39 D0318 17:09:40.410801 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.411342 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.411356 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 37 D0318 17:09:40.411364 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:40 executing program 3: pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff}, 0x80) fremovexattr(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='c']) D0318 17:09:40.413297 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.413396 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 38 D0318 17:09:40.413610 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.416258 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.416293 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 40 D0318 17:09:40.416310 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.416448 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.416475 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 41 D0318 17:09:40.416484 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.416756 434971 usertrap_amd64.go:212] [ 2854( 664): 2858( 665)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.416839 434971 usertrap_amd64.go:122] [ 2854( 664): 2858( 665)] Allocate a new trap: 0xc009098120 42 D0318 17:09:40.416891 434971 usertrap_amd64.go:225] [ 2854( 664): 2858( 665)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.417915 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.417986 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 38 D0318 17:09:40.418002 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.418051 434971 usertrap_amd64.go:212] [ 2854( 664): 2858( 665)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:40.418069 434971 usertrap_amd64.go:122] [ 2854( 664): 2858( 665)] Allocate a new trap: 0xc009098120 43 D0318 17:09:40.418080 434971 usertrap_amd64.go:225] [ 2854( 664): 2858( 665)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.420364 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.420403 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 37 D0318 17:09:40.420504 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.420623 434971 usertrap_amd64.go:212] [ 2854( 664): 2854( 664)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.420657 434971 usertrap_amd64.go:122] [ 2854( 664): 2854( 664)] Allocate a new trap: 0xc009098120 44 D0318 17:09:40.420669 434971 usertrap_amd64.go:225] [ 2854( 664): 2854( 664)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:40.421089 434971 task_exit.go:204] [ 2854( 664): 2854( 664)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.421139 434971 task_exit.go:204] [ 2854( 664): 2854( 664)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.421160 434971 task_signals.go:204] [ 2854( 664): 2858( 665)] Signal 9, PID: 2854, TID: 2858, fault addr: 0x0: terminating thread group D0318 17:09:40.421188 434971 task_exit.go:204] [ 2854( 664): 2858( 665)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.421543 434971 task_exit.go:204] [ 2854( 664): 2858( 665)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.421583 434971 task_exit.go:204] [ 2854( 664): 2858( 665)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.421604 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.421655 434971 task_exit.go:204] [ 2854( 664): 2854( 664)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.421717 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.421734 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 38 D0318 17:09:40.421745 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:40 executing program 2: prctl$PR_GET_SECCOMP(0x37) D0318 17:09:40.423262 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.423298 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 39 D0318 17:09:40.423312 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.423569 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.423645 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 40 D0318 17:09:40.423657 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.423782 434971 usertrap_amd64.go:212] [ 2855( 102): 2860( 103)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.423814 434971 usertrap_amd64.go:122] [ 2855( 102): 2860( 103)] Allocate a new trap: 0xc008160000 41 D0318 17:09:40.423830 434971 usertrap_amd64.go:225] [ 2855( 102): 2860( 103)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.424888 434971 usertrap_amd64.go:212] [ 2855( 102): 2855( 102)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.424925 434971 usertrap_amd64.go:122] [ 2855( 102): 2855( 102)] Allocate a new trap: 0xc008160000 42 D0318 17:09:40.424939 434971 usertrap_amd64.go:225] [ 2855( 102): 2855( 102)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.425487 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.425525 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 39 D0318 17:09:40.425536 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.425749 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.425830 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 39 D0318 17:09:40.425895 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.425827 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.426014 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 40 D0318 17:09:40.426031 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.426059 434971 usertrap_amd64.go:212] [ 2856( 144): 2861( 145)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.426082 434971 usertrap_amd64.go:122] [ 2856( 144): 2861( 145)] Allocate a new trap: 0xc00a07a0c0 41 D0318 17:09:40.426090 434971 usertrap_amd64.go:225] [ 2856( 144): 2861( 145)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.426314 434971 task_exit.go:204] [ 2855( 102): 2855( 102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.426582 434971 task_exit.go:204] [ 2855( 102): 2855( 102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.426683 434971 task_signals.go:204] [ 2855( 102): 2860( 103)] Signal 9, PID: 2855, TID: 2860, fault addr: 0x0: terminating thread group D0318 17:09:40.426726 434971 task_exit.go:204] [ 2855( 102): 2860( 103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.427108 434971 task_exit.go:204] [ 2855( 102): 2860( 103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.427163 434971 task_exit.go:204] [ 2855( 102): 2860( 103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.427178 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.427997 434971 task_exit.go:204] [ 2855( 102): 2855( 102)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x9, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:40.429518 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.429553 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 37 D0318 17:09:40.429637 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.429797 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.429823 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 40 D0318 17:09:40.429833 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.430069 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.430096 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 41 D0318 17:09:40.430114 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.430175 434971 usertrap_amd64.go:212] [ 2859( 773): 2863( 774)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.430211 434971 usertrap_amd64.go:122] [ 2859( 773): 2863( 774)] Allocate a new trap: 0xc0015960f0 42 D0318 17:09:40.430225 434971 usertrap_amd64.go:225] [ 2859( 773): 2863( 774)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.431156 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.431196 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 38 D0318 17:09:40.431207 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.431154 434971 usertrap_amd64.go:212] [ 2859( 773): 2859( 773)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.431364 434971 usertrap_amd64.go:122] [ 2859( 773): 2859( 773)] Allocate a new trap: 0xc0015960f0 43 D0318 17:09:40.431381 434971 usertrap_amd64.go:225] [ 2859( 773): 2859( 773)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.432447 434971 task_exit.go:204] [ 2859( 773): 2859( 773)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.432557 434971 task_exit.go:204] [ 2859( 773): 2859( 773)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.432606 434971 task_signals.go:204] [ 2859( 773): 2863( 774)] Signal 9, PID: 2859, TID: 2863, fault addr: 0x0: terminating thread group D0318 17:09:40.432642 434971 task_exit.go:204] [ 2859( 773): 2863( 774)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.433167 434971 task_exit.go:204] [ 2859( 773): 2863( 774)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.433217 434971 task_exit.go:204] [ 2859( 773): 2863( 774)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.433234 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.433327 434971 task_exit.go:204] [ 2859( 773): 2859( 773)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8982, &(0x7f0000000000)) D0318 17:09:40.436442 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.436473 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 39 D0318 17:09:40.436485 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.439263 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.439354 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 40 D0318 17:09:40.439375 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.439577 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.439674 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 41 D0318 17:09:40.439690 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.439710 434971 usertrap_amd64.go:212] [ 2862( 666): 2865( 667)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.439765 434971 usertrap_amd64.go:122] [ 2862( 666): 2865( 667)] Allocate a new trap: 0xc008058180 42 D0318 17:09:40.439782 434971 usertrap_amd64.go:225] [ 2862( 666): 2865( 667)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.439880 434971 usertrap_amd64.go:212] [ 2856( 144): 2856( 144)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.439915 434971 usertrap_amd64.go:122] [ 2856( 144): 2856( 144)] Allocate a new trap: 0xc00a07a0c0 42 D0318 17:09:40.439928 434971 usertrap_amd64.go:225] [ 2856( 144): 2856( 144)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.440074 434971 usertrap_amd64.go:212] [ 2862( 666): 2862( 666)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.440108 434971 usertrap_amd64.go:122] [ 2862( 666): 2862( 666)] Allocate a new trap: 0xc008058180 43 D0318 17:09:40.440125 434971 usertrap_amd64.go:225] [ 2862( 666): 2862( 666)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.441453 434971 task_exit.go:204] [ 2856( 144): 2856( 144)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.441519 434971 task_exit.go:204] [ 2856( 144): 2856( 144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.441527 434971 task_signals.go:204] [ 2856( 144): 2861( 145)] Signal 9, PID: 2856, TID: 2861, fault addr: 0x0: terminating thread group D0318 17:09:40.441551 434971 task_exit.go:204] [ 2856( 144): 2861( 145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.441785 434971 task_exit.go:204] [ 2862( 666): 2862( 666)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.441836 434971 task_signals.go:204] [ 2862( 666): 2865( 667)] Signal 9, PID: 2862, TID: 2865, fault addr: 0x0: terminating thread group D0318 17:09:40.441849 434971 task_exit.go:204] [ 2862( 666): 2862( 666)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.441877 434971 task_exit.go:204] [ 2862( 666): 2865( 667)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.442083 434971 task_exit.go:204] [ 2856( 144): 2861( 145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.442154 434971 task_exit.go:204] [ 2856( 144): 2861( 145)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.442170 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.442344 434971 task_exit.go:204] [ 2862( 666): 2865( 667)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.442378 434971 task_exit.go:204] [ 2862( 666): 2865( 667)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.442391 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.443161 434971 task_exit.go:204] [ 2862( 666): 2862( 666)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.443208 434971 task_exit.go:204] [ 2856( 144): 2856( 144)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x1b, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:40.449233 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.449286 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 37 D0318 17:09:40.449421 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.450442 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.450473 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 38 D0318 17:09:40.450484 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.451311 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.451348 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 36 D0318 17:09:40.451446 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.455034 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.455138 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 37 D0318 17:09:40.455155 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.455237 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.455257 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 39 D0318 17:09:40.455268 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.458651 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.458704 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 40 D0318 17:09:40.458723 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.459003 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.459031 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 41 D0318 17:09:40.459042 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.459106 434971 usertrap_amd64.go:212] [ 2867( 668): 2868( 669)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.459130 434971 usertrap_amd64.go:122] [ 2867( 668): 2868( 669)] Allocate a new trap: 0xc00a07a150 42 D0318 17:09:40.459137 434971 usertrap_amd64.go:225] [ 2867( 668): 2868( 669)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.459836 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.459868 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 37 D0318 17:09:40.460010 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.460055 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.460075 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 38 D0318 17:09:40.460087 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.461363 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.461391 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 38 D0318 17:09:40.461402 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.461466 434971 usertrap_amd64.go:212] [ 2867( 668): 2867( 668)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.461509 434971 usertrap_amd64.go:122] [ 2867( 668): 2867( 668)] Allocate a new trap: 0xc00a07a150 43 D0318 17:09:40.461525 434971 usertrap_amd64.go:225] [ 2867( 668): 2867( 668)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.463103 434971 task_exit.go:204] [ 2867( 668): 2867( 668)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.463329 434971 task_exit.go:204] [ 2867( 668): 2867( 668)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.463474 434971 task_signals.go:204] [ 2867( 668): 2868( 669)] Signal 9, PID: 2867, TID: 2868, fault addr: 0x0: terminating thread group D0318 17:09:40.463514 434971 task_exit.go:204] [ 2867( 668): 2868( 669)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.463929 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.464369 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 39 D0318 17:09:40.464386 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.464049 434971 task_exit.go:204] [ 2867( 668): 2868( 669)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.464412 434971 task_exit.go:204] [ 2867( 668): 2868( 669)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.464445 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.464774 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.464827 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 40 D0318 17:09:40.464854 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.465089 434971 task_exit.go:204] [ 2867( 668): 2867( 668)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.465404 434971 usertrap_amd64.go:212] [ 2866( 104): 2869( 105)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.465440 434971 usertrap_amd64.go:122] [ 2866( 104): 2869( 105)] Allocate a new trap: 0xc008160090 41 D0318 17:09:40.465453 434971 usertrap_amd64.go:225] [ 2866( 104): 2869( 105)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) 17:09:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x40305839, 0x0) D0318 17:09:40.466381 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.466527 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 39 D0318 17:09:40.466566 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.467678 434971 usertrap_amd64.go:212] [ 2866( 104): 2866( 104)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.467870 434971 usertrap_amd64.go:122] [ 2866( 104): 2866( 104)] Allocate a new trap: 0xc008160090 42 D0318 17:09:40.467966 434971 usertrap_amd64.go:225] [ 2866( 104): 2866( 104)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.470093 434971 task_exit.go:204] [ 2866( 104): 2866( 104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.470175 434971 task_exit.go:204] [ 2866( 104): 2866( 104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.470215 434971 task_signals.go:204] [ 2866( 104): 2869( 105)] Signal 9, PID: 2866, TID: 2869, fault addr: 0x0: terminating thread group D0318 17:09:40.470242 434971 task_exit.go:204] [ 2866( 104): 2869( 105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.470331 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.470363 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 40 D0318 17:09:40.470375 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.470704 434971 task_exit.go:204] [ 2866( 104): 2869( 105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.470807 434971 task_exit.go:204] [ 2866( 104): 2869( 105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.470860 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.470826 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.471021 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 41 D0318 17:09:40.471094 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.472042 434971 task_exit.go:204] [ 2866( 104): 2866( 104)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8955, 0x0) D0318 17:09:40.473257 434971 usertrap_amd64.go:212] [ 2864( 775): 2871( 776)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.473289 434971 usertrap_amd64.go:122] [ 2864( 775): 2871( 776)] Allocate a new trap: 0xc0083c80c0 42 D0318 17:09:40.473300 434971 usertrap_amd64.go:225] [ 2864( 775): 2871( 776)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.474900 434971 usertrap_amd64.go:212] [ 2864( 775): 2864( 775)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.475008 434971 usertrap_amd64.go:122] [ 2864( 775): 2864( 775)] Allocate a new trap: 0xc0083c80c0 43 D0318 17:09:40.475050 434971 usertrap_amd64.go:225] [ 2864( 775): 2864( 775)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.476439 434971 task_exit.go:204] [ 2864( 775): 2864( 775)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.476496 434971 task_exit.go:204] [ 2864( 775): 2864( 775)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.476528 434971 task_signals.go:204] [ 2864( 775): 2871( 776)] Signal 9, PID: 2864, TID: 2871, fault addr: 0x0: terminating thread group D0318 17:09:40.476549 434971 task_exit.go:204] [ 2864( 775): 2871( 776)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.476961 434971 task_exit.go:204] [ 2864( 775): 2871( 776)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.476998 434971 task_exit.go:204] [ 2864( 775): 2871( 776)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.477014 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.478943 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.478988 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 36 D0318 17:09:40.479083 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.479453 434971 task_exit.go:204] [ 2864( 775): 2864( 775)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) D0318 17:09:40.480485 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.480547 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 37 D0318 17:09:40.480696 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.481099 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.481155 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 37 D0318 17:09:40.481167 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.482515 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.482555 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 38 D0318 17:09:40.482582 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.489310 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.489352 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 38 D0318 17:09:40.489394 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.492331 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.492377 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 39 D0318 17:09:40.492393 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.492593 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.492591 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.492646 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 40 D0318 17:09:40.492658 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 36 D0318 17:09:40.492828 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.492662 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.493026 434971 usertrap_amd64.go:212] [ 2870( 146): 2875( 147)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.493051 434971 usertrap_amd64.go:122] [ 2870( 146): 2875( 147)] Allocate a new trap: 0xc009098150 41 D0318 17:09:40.493065 434971 usertrap_amd64.go:225] [ 2870( 146): 2875( 147)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.493769 434971 usertrap_amd64.go:212] [ 2870( 146): 2870( 146)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.493804 434971 usertrap_amd64.go:122] [ 2870( 146): 2870( 146)] Allocate a new trap: 0xc009098150 42 D0318 17:09:40.493818 434971 usertrap_amd64.go:225] [ 2870( 146): 2870( 146)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.494464 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.494490 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 37 D0318 17:09:40.494503 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.494982 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.495029 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 39 D0318 17:09:40.495041 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.495323 434971 task_exit.go:204] [ 2870( 146): 2870( 146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.495391 434971 task_exit.go:204] [ 2870( 146): 2870( 146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.495456 434971 task_signals.go:204] [ 2870( 146): 2875( 147)] Signal 9, PID: 2870, TID: 2875, fault addr: 0x0: terminating thread group D0318 17:09:40.495490 434971 task_exit.go:204] [ 2870( 146): 2875( 147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.495874 434971 task_exit.go:204] [ 2870( 146): 2875( 147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.495906 434971 task_exit.go:204] [ 2870( 146): 2875( 147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.495919 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.496527 434971 task_exit.go:204] [ 2870( 146): 2870( 146)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: r0 = inotify_init1(0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) D0318 17:09:40.499075 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.499109 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 40 D0318 17:09:40.499121 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.499249 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.499327 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 38 D0318 17:09:40.499381 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.499424 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.499461 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 41 D0318 17:09:40.499495 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.499644 434971 usertrap_amd64.go:212] [ 2872( 670): 2876( 671)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.499681 434971 usertrap_amd64.go:122] [ 2872( 670): 2876( 671)] Allocate a new trap: 0xc000b1c0c0 42 D0318 17:09:40.499702 434971 usertrap_amd64.go:225] [ 2872( 670): 2876( 671)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.500382 434971 usertrap_amd64.go:212] [ 2872( 670): 2876( 671)] Found the pattern at ip 55dfedfb0999:sysno 257 D0318 17:09:40.500422 434971 usertrap_amd64.go:122] [ 2872( 670): 2876( 671)] Allocate a new trap: 0xc000b1c0c0 43 D0318 17:09:40.500441 434971 usertrap_amd64.go:225] [ 2872( 670): 2876( 671)] Apply the binary patch addr 55dfedfb0999 trap addr 64d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.501213 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.501251 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 37 D0318 17:09:40.501327 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.502926 434971 usertrap_amd64.go:212] [ 2872( 670): 2872( 670)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.502963 434971 usertrap_amd64.go:122] [ 2872( 670): 2872( 670)] Allocate a new trap: 0xc000b1c0c0 44 D0318 17:09:40.502977 434971 usertrap_amd64.go:225] [ 2872( 670): 2872( 670)] Apply the binary patch addr 55dfedfb0c93 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0318 17:09:40.503083 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.503111 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 38 D0318 17:09:40.503121 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.503569 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.503632 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 39 D0318 17:09:40.503648 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.503664 434971 task_exit.go:204] [ 2872( 670): 2872( 670)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.503711 434971 task_exit.go:204] [ 2872( 670): 2872( 670)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.503754 434971 task_signals.go:204] [ 2872( 670): 2876( 671)] Signal 9, PID: 2872, TID: 2876, fault addr: 0x0: terminating thread group D0318 17:09:40.503982 434971 task_exit.go:204] [ 2872( 670): 2876( 671)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.504372 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.504410 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 40 D0318 17:09:40.504429 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.504426 434971 task_exit.go:204] [ 2872( 670): 2876( 671)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.504450 434971 task_exit.go:204] [ 2872( 670): 2876( 671)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.504468 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.504584 434971 usertrap_amd64.go:212] [ 2873( 106): 2878( 107)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.504628 434971 usertrap_amd64.go:122] [ 2873( 106): 2878( 107)] Allocate a new trap: 0xc000b1c0f0 41 D0318 17:09:40.504651 434971 usertrap_amd64.go:225] [ 2873( 106): 2878( 107)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.505095 434971 task_exit.go:204] [ 2872( 670): 2872( 670)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.506539 434971 usertrap_amd64.go:212] [ 2873( 106): 2873( 106)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.506576 434971 usertrap_amd64.go:122] [ 2873( 106): 2873( 106)] Allocate a new trap: 0xc000b1c0f0 42 D0318 17:09:40.506592 434971 usertrap_amd64.go:225] [ 2873( 106): 2873( 106)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) 17:09:40 executing program 2: io_destroy(0x0) io_setup(0x3, &(0x7f0000000ec0)) D0318 17:09:40.508533 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.508567 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 39 D0318 17:09:40.508584 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.509140 434971 task_exit.go:204] [ 2873( 106): 2873( 106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.509209 434971 task_exit.go:204] [ 2873( 106): 2873( 106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.509256 434971 task_signals.go:204] [ 2873( 106): 2878( 107)] Signal 9, PID: 2873, TID: 2878, fault addr: 0x0: terminating thread group D0318 17:09:40.509301 434971 task_exit.go:204] [ 2873( 106): 2878( 107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.509779 434971 task_exit.go:204] [ 2873( 106): 2878( 107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.509820 434971 task_exit.go:204] [ 2873( 106): 2878( 107)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.509841 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.510734 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.510775 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 36 D0318 17:09:40.510913 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.510935 434971 task_exit.go:204] [ 2873( 106): 2873( 106)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000180)={@remote}, 0x14) D0318 17:09:40.512332 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.512369 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 37 D0318 17:09:40.512387 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.512595 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.512688 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 40 D0318 17:09:40.512722 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.512920 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.512949 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 41 D0318 17:09:40.512959 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.513264 434971 usertrap_amd64.go:212] [ 2874( 777): 2880( 778)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.513350 434971 usertrap_amd64.go:122] [ 2874( 777): 2880( 778)] Allocate a new trap: 0xc000576210 42 D0318 17:09:40.513427 434971 usertrap_amd64.go:225] [ 2874( 777): 2880( 778)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.514209 434971 usertrap_amd64.go:212] [ 2874( 777): 2874( 777)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.514242 434971 usertrap_amd64.go:122] [ 2874( 777): 2874( 777)] Allocate a new trap: 0xc000576210 43 D0318 17:09:40.514256 434971 usertrap_amd64.go:225] [ 2874( 777): 2874( 777)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.515484 434971 task_exit.go:204] [ 2874( 777): 2874( 777)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.515576 434971 task_signals.go:204] [ 2874( 777): 2880( 778)] Signal 9, PID: 2874, TID: 2880, fault addr: 0x0: terminating thread group D0318 17:09:40.515709 434971 task_exit.go:204] [ 2874( 777): 2874( 777)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.515791 434971 task_exit.go:204] [ 2874( 777): 2880( 778)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.516309 434971 task_exit.go:204] [ 2874( 777): 2880( 778)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.516432 434971 task_exit.go:204] [ 2874( 777): 2880( 778)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.516507 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.516791 434971 task_exit.go:204] [ 2874( 777): 2874( 777)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.516820 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.516974 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 37 D0318 17:09:40.517141 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x890b, &(0x7f0000000000)) D0318 17:09:40.518792 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.518825 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 38 D0318 17:09:40.518838 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.519332 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.519366 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 38 D0318 17:09:40.519383 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.522505 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.522555 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 39 D0318 17:09:40.522569 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.522869 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.522976 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 40 D0318 17:09:40.523032 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.523152 434971 usertrap_amd64.go:212] [ 2877( 148): 2882( 149)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.523233 434971 usertrap_amd64.go:122] [ 2877( 148): 2882( 149)] Allocate a new trap: 0xc001596180 41 D0318 17:09:40.523300 434971 usertrap_amd64.go:225] [ 2877( 148): 2882( 149)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.524013 434971 usertrap_amd64.go:212] [ 2877( 148): 2877( 148)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.524053 434971 usertrap_amd64.go:122] [ 2877( 148): 2877( 148)] Allocate a new trap: 0xc001596180 42 D0318 17:09:40.524067 434971 usertrap_amd64.go:225] [ 2877( 148): 2877( 148)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.524515 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.524554 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 39 D0318 17:09:40.524567 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.525835 434971 task_exit.go:204] [ 2877( 148): 2877( 148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.525882 434971 task_exit.go:204] [ 2877( 148): 2877( 148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.525905 434971 task_signals.go:204] [ 2877( 148): 2882( 149)] Signal 9, PID: 2877, TID: 2882, fault addr: 0x0: terminating thread group D0318 17:09:40.525918 434971 task_exit.go:204] [ 2877( 148): 2882( 149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.526183 434971 task_exit.go:204] [ 2877( 148): 2882( 149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.526218 434971 task_exit.go:204] [ 2877( 148): 2882( 149)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.526229 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.527197 434971 task_exit.go:204] [ 2877( 148): 2877( 148)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.527368 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.527568 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 37 D0318 17:09:40.527951 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.531190 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.531368 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 38 D0318 17:09:40.531412 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) D0318 17:09:40.533155 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.533207 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 40 D0318 17:09:40.533233 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.533568 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.533682 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 41 D0318 17:09:40.533771 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.533808 434971 usertrap_amd64.go:212] [ 2879( 672): 2883( 673)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.533819 434971 usertrap_amd64.go:122] [ 2879( 672): 2883( 673)] Allocate a new trap: 0xc0083c8120 42 D0318 17:09:40.533829 434971 usertrap_amd64.go:225] [ 2879( 672): 2883( 673)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.534604 434971 usertrap_amd64.go:212] [ 2879( 672): 2879( 672)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.534702 434971 usertrap_amd64.go:122] [ 2879( 672): 2879( 672)] Allocate a new trap: 0xc0083c8120 43 D0318 17:09:40.534885 434971 usertrap_amd64.go:225] [ 2879( 672): 2879( 672)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.536969 434971 task_exit.go:204] [ 2879( 672): 2879( 672)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.537067 434971 task_exit.go:204] [ 2879( 672): 2879( 672)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.537114 434971 task_signals.go:204] [ 2879( 672): 2883( 673)] Signal 9, PID: 2879, TID: 2883, fault addr: 0x0: terminating thread group D0318 17:09:40.537326 434971 task_exit.go:204] [ 2879( 672): 2883( 673)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.537132 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.537504 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 39 D0318 17:09:40.537526 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.537903 434971 task_exit.go:204] [ 2879( 672): 2883( 673)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.537997 434971 task_exit.go:204] [ 2879( 672): 2883( 673)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.538019 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.538916 434971 task_exit.go:204] [ 2879( 672): 2879( 672)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)) D0318 17:09:40.541723 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.541785 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 40 D0318 17:09:40.541878 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.542135 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.542278 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 41 D0318 17:09:40.542349 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.542505 434971 usertrap_amd64.go:212] [ 2881( 779): 2884( 780)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.542525 434971 usertrap_amd64.go:122] [ 2881( 779): 2884( 780)] Allocate a new trap: 0xc0090981b0 42 D0318 17:09:40.542540 434971 usertrap_amd64.go:225] [ 2881( 779): 2884( 780)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.542960 434971 usertrap_amd64.go:212] [ 2881( 779): 2881( 779)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.542996 434971 usertrap_amd64.go:122] [ 2881( 779): 2881( 779)] Allocate a new trap: 0xc0090981b0 43 D0318 17:09:40.543016 434971 usertrap_amd64.go:225] [ 2881( 779): 2881( 779)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.544102 434971 task_exit.go:204] [ 2881( 779): 2881( 779)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.544188 434971 task_exit.go:204] [ 2881( 779): 2881( 779)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.544379 434971 task_signals.go:204] [ 2881( 779): 2884( 780)] Signal 9, PID: 2881, TID: 2884, fault addr: 0x0: terminating thread group D0318 17:09:40.544428 434971 task_exit.go:204] [ 2881( 779): 2884( 780)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.544877 434971 task_exit.go:204] [ 2881( 779): 2884( 780)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.544935 434971 task_exit.go:204] [ 2881( 779): 2884( 780)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.544949 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.545026 434971 task_exit.go:204] [ 2881( 779): 2881( 779)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8907, 0x0) D0318 17:09:40.548356 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.548395 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 36 D0318 17:09:40.548529 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.549742 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.549780 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 36 D0318 17:09:40.549900 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.550182 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.550221 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 37 D0318 17:09:40.550239 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.551371 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.551407 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 37 D0318 17:09:40.551420 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.555693 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.555734 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 37 D0318 17:09:40.555855 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.557439 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.557482 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 38 D0318 17:09:40.557494 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.557529 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.557551 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 38 D0318 17:09:40.557585 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.557659 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.557691 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 38 D0318 17:09:40.557710 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.562497 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.562613 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 39 D0318 17:09:40.562644 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.562727 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.562772 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 39 D0318 17:09:40.562788 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.562974 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.563013 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 40 D0318 17:09:40.563025 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.563230 434971 usertrap_amd64.go:212] [ 2886( 150): 2889( 151)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.563338 434971 usertrap_amd64.go:122] [ 2886( 150): 2889( 151)] Allocate a new trap: 0xc0081600c0 41 D0318 17:09:40.563354 434971 usertrap_amd64.go:225] [ 2886( 150): 2889( 151)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.564375 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.564527 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 37 D0318 17:09:40.564657 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.565440 434971 usertrap_amd64.go:212] [ 2886( 150): 2886( 150)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.565469 434971 usertrap_amd64.go:122] [ 2886( 150): 2886( 150)] Allocate a new trap: 0xc0081600c0 42 D0318 17:09:40.565481 434971 usertrap_amd64.go:225] [ 2886( 150): 2886( 150)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.565864 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.565894 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 39 D0318 17:09:40.565910 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.566075 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.566108 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 38 D0318 17:09:40.566117 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.566170 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.566252 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 40 D0318 17:09:40.566272 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.566361 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.566420 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 40 D0318 17:09:40.566440 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.566770 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.566812 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 41 D0318 17:09:40.566837 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.567202 434971 usertrap_amd64.go:212] [ 2887( 674): 2891( 675)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.567235 434971 usertrap_amd64.go:122] [ 2887( 674): 2891( 675)] Allocate a new trap: 0xc000d141b0 42 D0318 17:09:40.567251 434971 usertrap_amd64.go:225] [ 2887( 674): 2891( 675)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.568331 434971 usertrap_amd64.go:212] [ 2887( 674): 2887( 674)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.568355 434971 usertrap_amd64.go:122] [ 2887( 674): 2887( 674)] Allocate a new trap: 0xc000d141b0 43 D0318 17:09:40.568365 434971 usertrap_amd64.go:225] [ 2887( 674): 2887( 674)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.568645 434971 task_exit.go:204] [ 2886( 150): 2886( 150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.568711 434971 task_exit.go:204] [ 2886( 150): 2886( 150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.568749 434971 task_signals.go:204] [ 2886( 150): 2889( 151)] Signal 9, PID: 2886, TID: 2889, fault addr: 0x0: terminating thread group D0318 17:09:40.568781 434971 task_exit.go:204] [ 2886( 150): 2889( 151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.568880 434971 usertrap_amd64.go:212] [ 2885( 108): 2890( 109)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.568918 434971 usertrap_amd64.go:122] [ 2885( 108): 2890( 109)] Allocate a new trap: 0xc0005762a0 41 D0318 17:09:40.568934 434971 usertrap_amd64.go:225] [ 2885( 108): 2890( 109)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.569334 434971 task_exit.go:204] [ 2886( 150): 2889( 151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.569423 434971 task_exit.go:204] [ 2886( 150): 2889( 151)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.569502 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.570055 434971 usertrap_amd64.go:212] [ 2885( 108): 2885( 108)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.570168 434971 usertrap_amd64.go:122] [ 2885( 108): 2885( 108)] Allocate a new trap: 0xc0005762a0 42 D0318 17:09:40.570256 434971 task_exit.go:204] [ 2887( 674): 2887( 674)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.570328 434971 task_exit.go:204] [ 2887( 674): 2887( 674)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.570249 434971 usertrap_amd64.go:225] [ 2885( 108): 2885( 108)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.570366 434971 task_signals.go:204] [ 2887( 674): 2891( 675)] Signal 9, PID: 2887, TID: 2891, fault addr: 0x0: terminating thread group D0318 17:09:40.570397 434971 task_exit.go:204] [ 2887( 674): 2891( 675)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.570932 434971 task_exit.go:204] [ 2887( 674): 2891( 675)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.570965 434971 task_exit.go:204] [ 2887( 674): 2891( 675)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.570977 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.571593 434971 task_exit.go:204] [ 2885( 108): 2885( 108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.571854 434971 task_exit.go:204] [ 2885( 108): 2885( 108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.571989 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.572057 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 39 D0318 17:09:40.572085 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.572036 434971 task_exit.go:204] [ 2887( 674): 2887( 674)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.572222 434971 task_signals.go:204] [ 2885( 108): 2890( 109)] Signal 9, PID: 2885, TID: 2890, fault addr: 0x0: terminating thread group D0318 17:09:40.572425 434971 task_exit.go:204] [ 2885( 108): 2890( 109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.572895 434971 task_exit.go:204] [ 2885( 108): 2890( 109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.572928 434971 task_exit.go:204] [ 2885( 108): 2890( 109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.572941 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.573909 434971 task_exit.go:204] [ 2886( 150): 2886( 150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.574002 434971 task_exit.go:204] [ 2885( 108): 2885( 108)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@private0}) 17:09:40 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_aout(r0, 0x0, 0x0) 17:09:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000100)=0x6, 0x4) D0318 17:09:40.577670 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.577707 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 40 D0318 17:09:40.577724 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.577972 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.578002 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 41 D0318 17:09:40.578012 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.578494 434971 usertrap_amd64.go:212] [ 2888( 781): 2892( 782)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.578527 434971 usertrap_amd64.go:122] [ 2888( 781): 2892( 782)] Allocate a new trap: 0xc0081600f0 42 D0318 17:09:40.578539 434971 usertrap_amd64.go:225] [ 2888( 781): 2892( 782)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.579416 434971 usertrap_amd64.go:212] [ 2888( 781): 2888( 781)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.579442 434971 usertrap_amd64.go:122] [ 2888( 781): 2888( 781)] Allocate a new trap: 0xc0081600f0 43 D0318 17:09:40.579459 434971 usertrap_amd64.go:225] [ 2888( 781): 2888( 781)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.580636 434971 task_exit.go:204] [ 2888( 781): 2888( 781)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.580701 434971 task_exit.go:204] [ 2888( 781): 2888( 781)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.580734 434971 task_signals.go:204] [ 2888( 781): 2892( 782)] Signal 9, PID: 2888, TID: 2892, fault addr: 0x0: terminating thread group D0318 17:09:40.580750 434971 task_exit.go:204] [ 2888( 781): 2892( 782)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.581094 434971 task_exit.go:204] [ 2888( 781): 2892( 782)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.581131 434971 task_exit.go:204] [ 2888( 781): 2892( 782)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.581142 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.582055 434971 task_exit.go:204] [ 2888( 781): 2888( 781)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80086601, 0x0) D0318 17:09:40.589955 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.590005 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 36 D0318 17:09:40.590097 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.590111 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.590150 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 36 D0318 17:09:40.590391 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.591800 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.591831 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 37 D0318 17:09:40.591848 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.593461 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.593621 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 37 D0318 17:09:40.593652 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.595417 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.595453 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 37 D0318 17:09:40.597544 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.597624 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 38 D0318 17:09:40.597643 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.599334 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.600459 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.600579 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 38 D0318 17:09:40.600775 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.600570 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.600969 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 37 D0318 17:09:40.600975 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.600999 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 39 D0318 17:09:40.601024 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.601087 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.601110 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 38 D0318 17:09:40.601115 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.601137 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.601408 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.601474 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 40 D0318 17:09:40.601492 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.601569 434971 usertrap_amd64.go:212] [ 2894( 110): 2897( 111)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.601717 434971 usertrap_amd64.go:122] [ 2894( 110): 2897( 111)] Allocate a new trap: 0xc00a07a1e0 41 D0318 17:09:40.601749 434971 usertrap_amd64.go:225] [ 2894( 110): 2897( 111)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.603198 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.603314 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 38 D0318 17:09:40.603334 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.604027 434971 usertrap_amd64.go:212] [ 2894( 110): 2894( 110)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.604200 434971 usertrap_amd64.go:122] [ 2894( 110): 2894( 110)] Allocate a new trap: 0xc00a07a1e0 42 D0318 17:09:40.604235 434971 usertrap_amd64.go:225] [ 2894( 110): 2894( 110)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.605693 434971 task_exit.go:204] [ 2894( 110): 2894( 110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.605759 434971 task_exit.go:204] [ 2894( 110): 2894( 110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.605793 434971 task_signals.go:204] [ 2894( 110): 2897( 111)] Signal 9, PID: 2894, TID: 2897, fault addr: 0x0: terminating thread group D0318 17:09:40.605823 434971 task_exit.go:204] [ 2894( 110): 2897( 111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.606170 434971 task_exit.go:204] [ 2894( 110): 2897( 111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.606200 434971 task_exit.go:204] [ 2894( 110): 2897( 111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.606216 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.606913 434971 task_exit.go:204] [ 2894( 110): 2894( 110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.607316 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.607431 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 39 D0318 17:09:40.607467 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) 17:09:40 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmctl$IPC_RMID(r0, 0x0) D0318 17:09:40.607851 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.607874 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 39 D0318 17:09:40.607893 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.608049 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.608224 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 40 D0318 17:09:40.608376 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.608408 434971 usertrap_amd64.go:212] [ 2893( 152): 2898( 153)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.608420 434971 usertrap_amd64.go:122] [ 2893( 152): 2898( 153)] Allocate a new trap: 0xc008058240 41 D0318 17:09:40.608429 434971 usertrap_amd64.go:225] [ 2893( 152): 2898( 153)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.610611 434971 usertrap_amd64.go:212] [ 2893( 152): 2893( 152)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.610657 434971 usertrap_amd64.go:122] [ 2893( 152): 2893( 152)] Allocate a new trap: 0xc008058240 42 D0318 17:09:40.610669 434971 usertrap_amd64.go:225] [ 2893( 152): 2893( 152)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.610763 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.610809 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 39 D0318 17:09:40.610830 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.612189 434971 task_exit.go:204] [ 2893( 152): 2893( 152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.612339 434971 task_exit.go:204] [ 2893( 152): 2893( 152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.612416 434971 task_signals.go:204] [ 2893( 152): 2898( 153)] Signal 9, PID: 2893, TID: 2898, fault addr: 0x0: terminating thread group D0318 17:09:40.612453 434971 task_exit.go:204] [ 2893( 152): 2898( 153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.612939 434971 task_exit.go:204] [ 2893( 152): 2898( 153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.612976 434971 task_exit.go:204] [ 2893( 152): 2898( 153)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.612987 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.613293 434971 task_exit.go:204] [ 2893( 152): 2893( 152)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x2, &(0x7f0000000280), 0x4) D0318 17:09:40.615998 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.616175 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 40 D0318 17:09:40.616211 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.616427 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.616462 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.616477 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 41 D0318 17:09:40.616496 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.616467 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 40 D0318 17:09:40.616546 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.616695 434971 usertrap_amd64.go:212] [ 2896( 783): 2899( 784)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.616830 434971 usertrap_amd64.go:122] [ 2896( 783): 2899( 784)] Allocate a new trap: 0xc0011940c0 42 D0318 17:09:40.616911 434971 usertrap_amd64.go:225] [ 2896( 783): 2899( 784)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.616847 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.616966 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 41 D0318 17:09:40.616978 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.617007 434971 usertrap_amd64.go:212] [ 2895( 676): 2900( 677)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.617017 434971 usertrap_amd64.go:122] [ 2895( 676): 2900( 677)] Allocate a new trap: 0xc008058270 42 D0318 17:09:40.617030 434971 usertrap_amd64.go:225] [ 2895( 676): 2900( 677)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.617789 434971 usertrap_amd64.go:212] [ 2896( 783): 2899( 784)] Found the pattern at ip 555843dff999:sysno 257 D0318 17:09:40.617821 434971 usertrap_amd64.go:122] [ 2896( 783): 2899( 784)] Allocate a new trap: 0xc0011940c0 43 D0318 17:09:40.617831 434971 usertrap_amd64.go:225] [ 2896( 783): 2899( 784)] Apply the binary patch addr 555843dff999 trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.618451 434971 usertrap_amd64.go:212] [ 2895( 676): 2895( 676)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.618487 434971 usertrap_amd64.go:122] [ 2895( 676): 2895( 676)] Allocate a new trap: 0xc008058270 43 D0318 17:09:40.618499 434971 usertrap_amd64.go:225] [ 2895( 676): 2895( 676)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.619328 434971 usertrap_amd64.go:212] [ 2896( 783): 2896( 783)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.619358 434971 usertrap_amd64.go:122] [ 2896( 783): 2896( 783)] Allocate a new trap: 0xc0011940c0 44 D0318 17:09:40.619368 434971 usertrap_amd64.go:225] [ 2896( 783): 2896( 783)] Apply the binary patch addr 555843dffc93 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0318 17:09:40.619630 434971 task_exit.go:204] [ 2896( 783): 2896( 783)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.619694 434971 task_exit.go:204] [ 2896( 783): 2896( 783)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.619728 434971 task_signals.go:204] [ 2896( 783): 2899( 784)] Signal 9, PID: 2896, TID: 2899, fault addr: 0x0: terminating thread group D0318 17:09:40.619768 434971 task_exit.go:204] [ 2896( 783): 2899( 784)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.620179 434971 task_exit.go:204] [ 2896( 783): 2899( 784)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.620213 434971 task_exit.go:204] [ 2896( 783): 2899( 784)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.620226 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.620553 434971 task_exit.go:204] [ 2895( 676): 2895( 676)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.620623 434971 task_exit.go:204] [ 2895( 676): 2895( 676)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.620666 434971 task_signals.go:204] [ 2895( 676): 2900( 677)] Signal 9, PID: 2895, TID: 2900, fault addr: 0x0: terminating thread group D0318 17:09:40.620695 434971 task_exit.go:204] [ 2895( 676): 2900( 677)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.620774 434971 task_exit.go:204] [ 2896( 783): 2896( 783)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.621147 434971 task_exit.go:204] [ 2895( 676): 2900( 677)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.621179 434971 task_exit.go:204] [ 2895( 676): 2900( 677)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.621188 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.621328 434971 task_exit.go:204] [ 2895( 676): 2895( 676)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000180)={{0x0, @broadcast, 0x0, 0x0, 'sh\x00'}, {@local}}, 0x44) D0318 17:09:40.621971 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.621992 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 36 D0318 17:09:40.622117 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) 17:09:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000240)={@mcast1}, 0x14) D0318 17:09:40.624298 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.624322 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 37 D0318 17:09:40.624334 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.626274 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.626301 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 36 D0318 17:09:40.626431 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.627883 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.627912 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 37 D0318 17:09:40.627923 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.628991 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.629023 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 37 D0318 17:09:40.629154 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.630285 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.630324 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 38 D0318 17:09:40.630335 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.634255 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.634285 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 38 D0318 17:09:40.634295 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.634931 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.635156 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 39 D0318 17:09:40.635175 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.635706 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.635739 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 38 D0318 17:09:40.635754 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.638256 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.638290 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 39 D0318 17:09:40.638301 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.638367 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.638397 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 37 D0318 17:09:40.638496 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.638653 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.638691 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 40 D0318 17:09:40.638709 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.638860 434971 usertrap_amd64.go:212] [ 2902( 154): 2905( 155)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.638887 434971 usertrap_amd64.go:122] [ 2902( 154): 2905( 155)] Allocate a new trap: 0xc0083c8150 41 D0318 17:09:40.638899 434971 usertrap_amd64.go:225] [ 2902( 154): 2905( 155)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.639731 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.639766 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 40 D0318 17:09:40.639774 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.639933 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.640043 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 39 D0318 17:09:40.640084 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.640076 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.640106 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 41 D0318 17:09:40.640120 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.640107 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.640188 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 38 D0318 17:09:40.640204 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.640431 434971 usertrap_amd64.go:212] [ 2902( 154): 2902( 154)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.640534 434971 usertrap_amd64.go:122] [ 2902( 154): 2902( 154)] Allocate a new trap: 0xc0083c8150 42 D0318 17:09:40.640667 434971 usertrap_amd64.go:225] [ 2902( 154): 2902( 154)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.640431 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.640832 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 40 D0318 17:09:40.640850 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.640877 434971 usertrap_amd64.go:212] [ 2901( 112): 2907( 113)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.640890 434971 usertrap_amd64.go:122] [ 2901( 112): 2907( 113)] Allocate a new trap: 0xc0080582a0 41 D0318 17:09:40.640899 434971 usertrap_amd64.go:225] [ 2901( 112): 2907( 113)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.641207 434971 usertrap_amd64.go:212] [ 2903( 678): 2906( 679)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.641572 434971 usertrap_amd64.go:122] [ 2903( 678): 2906( 679)] Allocate a new trap: 0xc000576360 42 D0318 17:09:40.641649 434971 usertrap_amd64.go:212] [ 2901( 112): 2901( 112)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.641688 434971 usertrap_amd64.go:122] [ 2901( 112): 2901( 112)] Allocate a new trap: 0xc0080582a0 42 D0318 17:09:40.641700 434971 usertrap_amd64.go:225] [ 2901( 112): 2901( 112)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.641667 434971 usertrap_amd64.go:225] [ 2903( 678): 2906( 679)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.642868 434971 task_exit.go:204] [ 2901( 112): 2901( 112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.642950 434971 task_exit.go:204] [ 2901( 112): 2901( 112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.642986 434971 task_signals.go:204] [ 2901( 112): 2907( 113)] Signal 9, PID: 2901, TID: 2907, fault addr: 0x0: terminating thread group D0318 17:09:40.643001 434971 task_exit.go:204] [ 2901( 112): 2907( 113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.643111 434971 usertrap_amd64.go:212] [ 2903( 678): 2903( 678)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.643193 434971 usertrap_amd64.go:122] [ 2903( 678): 2903( 678)] Allocate a new trap: 0xc000576360 43 D0318 17:09:40.643218 434971 usertrap_amd64.go:225] [ 2903( 678): 2903( 678)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.643754 434971 task_exit.go:204] [ 2902( 154): 2902( 154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.643883 434971 task_exit.go:204] [ 2902( 154): 2902( 154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.643885 434971 task_signals.go:204] [ 2902( 154): 2905( 155)] Signal 9, PID: 2902, TID: 2905, fault addr: 0x0: terminating thread group D0318 17:09:40.643942 434971 task_exit.go:204] [ 2902( 154): 2905( 155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.644363 434971 task_exit.go:204] [ 2902( 154): 2905( 155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.644395 434971 task_exit.go:204] [ 2902( 154): 2905( 155)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.644408 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.644501 434971 task_exit.go:204] [ 2901( 112): 2907( 113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.644551 434971 task_exit.go:204] [ 2901( 112): 2907( 113)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.644564 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.644769 434971 task_exit.go:204] [ 2903( 678): 2903( 678)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.644922 434971 task_signals.go:204] [ 2903( 678): 2906( 679)] Signal 9, PID: 2903, TID: 2906, fault addr: 0x0: terminating thread group D0318 17:09:40.644977 434971 task_exit.go:204] [ 2902( 154): 2902( 154)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.645041 434971 task_exit.go:204] [ 2903( 678): 2903( 678)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.645085 434971 task_exit.go:204] [ 2903( 678): 2906( 679)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.645249 434971 task_exit.go:204] [ 2901( 112): 2901( 112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.645564 434971 task_exit.go:204] [ 2903( 678): 2906( 679)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.645593 434971 task_exit.go:204] [ 2903( 678): 2906( 679)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.645604 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 17:09:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 17:09:40 executing program 0: io_setup(0x1, &(0x7f0000000180)) io_setup(0x3, &(0x7f0000000300)) D0318 17:09:40.648345 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.648382 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 39 D0318 17:09:40.648395 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.648664 434971 task_exit.go:204] [ 2903( 678): 2903( 678)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) D0318 17:09:40.652143 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.652179 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 40 D0318 17:09:40.652195 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.652400 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.652551 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 41 D0318 17:09:40.652588 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.652638 434971 usertrap_amd64.go:212] [ 2904( 785): 2908( 786)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.652660 434971 usertrap_amd64.go:122] [ 2904( 785): 2908( 786)] Allocate a new trap: 0xc0083c8180 42 D0318 17:09:40.652669 434971 usertrap_amd64.go:225] [ 2904( 785): 2908( 786)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.653984 434971 usertrap_amd64.go:212] [ 2904( 785): 2904( 785)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.654015 434971 usertrap_amd64.go:122] [ 2904( 785): 2904( 785)] Allocate a new trap: 0xc0083c8180 43 D0318 17:09:40.654026 434971 usertrap_amd64.go:225] [ 2904( 785): 2904( 785)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.656477 434971 task_exit.go:204] [ 2904( 785): 2904( 785)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.656534 434971 task_exit.go:204] [ 2904( 785): 2904( 785)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.656589 434971 task_signals.go:204] [ 2904( 785): 2908( 786)] Signal 9, PID: 2904, TID: 2908, fault addr: 0x0: terminating thread group D0318 17:09:40.656621 434971 task_exit.go:204] [ 2904( 785): 2908( 786)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.656949 434971 task_exit.go:204] [ 2904( 785): 2908( 786)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.656987 434971 task_exit.go:204] [ 2904( 785): 2908( 786)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.657000 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.657955 434971 task_exit.go:204] [ 2904( 785): 2904( 785)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: mq_open(&(0x7f0000000500)='%}\x00', 0x40, 0x0, &(0x7f0000000540)={0x0, 0x4800000000000, 0x7}) D0318 17:09:40.659401 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.659474 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 37 D0318 17:09:40.659556 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.661618 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.661689 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 38 D0318 17:09:40.661711 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.663002 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.663036 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 36 D0318 17:09:40.663161 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.664446 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.664477 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 37 D0318 17:09:40.664488 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.667868 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.667903 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 37 D0318 17:09:40.668012 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.668546 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.668594 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 36 D0318 17:09:40.668817 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.669384 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.669425 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 38 D0318 17:09:40.669442 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.670750 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.670799 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 37 D0318 17:09:40.670818 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.671349 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.671443 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 38 D0318 17:09:40.671648 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.672826 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.672861 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 39 D0318 17:09:40.672873 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.674362 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.674390 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 39 D0318 17:09:40.674398 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.674991 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.675074 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 38 D0318 17:09:40.675102 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.677262 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.677440 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 39 D0318 17:09:40.677478 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.677289 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.677506 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.677526 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 40 D0318 17:09:40.677558 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.677516 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 40 D0318 17:09:40.677594 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.677755 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.677856 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 40 D0318 17:09:40.677892 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.677868 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.677953 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.677964 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 41 D0318 17:09:40.677972 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 41 D0318 17:09:40.677979 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.677983 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.678083 434971 usertrap_amd64.go:212] [ 2909( 680): 2914( 681)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.678169 434971 usertrap_amd64.go:122] [ 2909( 680): 2914( 681)] Allocate a new trap: 0xc000d141e0 42 D0318 17:09:40.678309 434971 usertrap_amd64.go:225] [ 2909( 680): 2914( 681)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.678108 434971 usertrap_amd64.go:212] [ 2911( 156): 2913( 157)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.678485 434971 usertrap_amd64.go:122] [ 2911( 156): 2913( 157)] Allocate a new trap: 0xc0083c81b0 41 D0318 17:09:40.678503 434971 usertrap_amd64.go:225] [ 2911( 156): 2913( 157)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.678576 434971 usertrap_amd64.go:212] [ 2912( 787): 2915( 788)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.678606 434971 usertrap_amd64.go:122] [ 2912( 787): 2915( 788)] Allocate a new trap: 0xc008160120 42 D0318 17:09:40.678617 434971 usertrap_amd64.go:225] [ 2912( 787): 2915( 788)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.679094 434971 usertrap_amd64.go:212] [ 2912( 787): 2912( 787)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.679129 434971 usertrap_amd64.go:122] [ 2912( 787): 2912( 787)] Allocate a new trap: 0xc008160120 43 D0318 17:09:40.679140 434971 usertrap_amd64.go:225] [ 2912( 787): 2912( 787)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.679248 434971 usertrap_amd64.go:212] [ 2909( 680): 2909( 680)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.679281 434971 usertrap_amd64.go:122] [ 2909( 680): 2909( 680)] Allocate a new trap: 0xc000d141e0 43 D0318 17:09:40.679296 434971 usertrap_amd64.go:225] [ 2909( 680): 2909( 680)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.679788 434971 task_exit.go:204] [ 2912( 787): 2912( 787)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.679844 434971 task_exit.go:204] [ 2912( 787): 2912( 787)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.679872 434971 task_signals.go:204] [ 2912( 787): 2915( 788)] Signal 9, PID: 2912, TID: 2915, fault addr: 0x0: terminating thread group D0318 17:09:40.679901 434971 task_exit.go:204] [ 2912( 787): 2915( 788)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.680001 434971 usertrap_amd64.go:212] [ 2911( 156): 2911( 156)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.680093 434971 usertrap_amd64.go:122] [ 2911( 156): 2911( 156)] Allocate a new trap: 0xc0083c81b0 42 D0318 17:09:40.680134 434971 usertrap_amd64.go:225] [ 2911( 156): 2911( 156)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.680373 434971 task_exit.go:204] [ 2912( 787): 2915( 788)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.680429 434971 task_exit.go:204] [ 2912( 787): 2915( 788)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.680444 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.680477 434971 task_exit.go:204] [ 2912( 787): 2912( 787)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.680716 434971 task_exit.go:204] [ 2909( 680): 2909( 680)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.680772 434971 task_exit.go:204] [ 2909( 680): 2909( 680)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.680818 434971 task_signals.go:204] [ 2909( 680): 2914( 681)] Signal 9, PID: 2909, TID: 2914, fault addr: 0x0: terminating thread group D0318 17:09:40.680837 434971 task_exit.go:204] [ 2909( 680): 2914( 681)] Transitioning from exit state TaskExitNone to TaskExitInitiated 17:09:40 executing program 3: socket(0x22, 0x0, 0x9) D0318 17:09:40.681235 434971 task_exit.go:204] [ 2909( 680): 2914( 681)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.681274 434971 task_exit.go:204] [ 2909( 680): 2914( 681)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.681290 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.682073 434971 task_exit.go:204] [ 2911( 156): 2911( 156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.682214 434971 task_exit.go:204] [ 2911( 156): 2911( 156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.682219 434971 task_signals.go:204] [ 2911( 156): 2913( 157)] Signal 9, PID: 2911, TID: 2913, fault addr: 0x0: terminating thread group D0318 17:09:40.682259 434971 task_exit.go:204] [ 2909( 680): 2909( 680)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.682313 434971 task_exit.go:204] [ 2911( 156): 2913( 157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.682379 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.682406 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 39 D0318 17:09:40.682415 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.682694 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.682735 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 40 D0318 17:09:40.682746 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.682859 434971 usertrap_amd64.go:212] [ 2910( 114): 2916( 115)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.682901 434971 usertrap_amd64.go:122] [ 2910( 114): 2916( 115)] Allocate a new trap: 0xc009098240 41 D0318 17:09:40.682894 434971 task_exit.go:204] [ 2911( 156): 2913( 157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.682928 434971 task_exit.go:204] [ 2911( 156): 2913( 157)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.682956 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.682913 434971 usertrap_amd64.go:225] [ 2910( 114): 2916( 115)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.683402 434971 task_exit.go:204] [ 2911( 156): 2911( 156)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "99bbefd43b9610187e25fbc1728a3c168d5b0242975ec3485bd152b0cd6d9d4dcd4141c2970c1e1d7a610c9dbd89dce232df4d9e829ed9aedb0b7e82cc8f693039a5e2163aa893c3285ed64e9c95e992"}, 0xd8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0xc0189436, &(0x7f0000000000)) 17:09:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x3c) D0318 17:09:40.684509 434971 usertrap_amd64.go:212] [ 2910( 114): 2910( 114)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.684541 434971 usertrap_amd64.go:122] [ 2910( 114): 2910( 114)] Allocate a new trap: 0xc009098240 42 D0318 17:09:40.684554 434971 usertrap_amd64.go:225] [ 2910( 114): 2910( 114)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.685994 434971 task_exit.go:204] [ 2910( 114): 2910( 114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.686041 434971 task_exit.go:204] [ 2910( 114): 2910( 114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.686067 434971 task_signals.go:204] [ 2910( 114): 2916( 115)] Signal 9, PID: 2910, TID: 2916, fault addr: 0x0: terminating thread group D0318 17:09:40.686095 434971 task_exit.go:204] [ 2910( 114): 2916( 115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.686434 434971 task_exit.go:204] [ 2910( 114): 2916( 115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.686462 434971 task_exit.go:204] [ 2910( 114): 2916( 115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.686473 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.686851 434971 task_exit.go:204] [ 2910( 114): 2910( 114)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8915, 0x0) D0318 17:09:40.689468 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.689503 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 37 D0318 17:09:40.689596 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.690820 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.690849 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 38 D0318 17:09:40.690860 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) I0318 17:09:40.692819 434971 watchdog.go:295] Watchdog starting loop, tasks: 66, discount: 0s D0318 17:09:40.694103 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.694138 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 39 D0318 17:09:40.694149 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.697303 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.697336 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 40 D0318 17:09:40.697347 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.697517 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.697572 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 36 D0318 17:09:40.697688 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.697842 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.697931 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 41 D0318 17:09:40.698004 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.698174 434971 usertrap_amd64.go:212] [ 2917( 682): 2920( 683)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.698205 434971 usertrap_amd64.go:122] [ 2917( 682): 2920( 683)] Allocate a new trap: 0xc0083480c0 42 D0318 17:09:40.698216 434971 usertrap_amd64.go:225] [ 2917( 682): 2920( 683)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.699244 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.699281 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 37 D0318 17:09:40.699294 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.699251 434971 usertrap_amd64.go:212] [ 2917( 682): 2917( 682)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.699412 434971 usertrap_amd64.go:122] [ 2917( 682): 2917( 682)] Allocate a new trap: 0xc0083480c0 43 D0318 17:09:40.699535 434971 usertrap_amd64.go:225] [ 2917( 682): 2917( 682)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.701281 434971 task_exit.go:204] [ 2917( 682): 2917( 682)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.701348 434971 task_exit.go:204] [ 2917( 682): 2917( 682)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.701382 434971 task_signals.go:204] [ 2917( 682): 2920( 683)] Signal 9, PID: 2917, TID: 2920, fault addr: 0x0: terminating thread group D0318 17:09:40.701420 434971 task_exit.go:204] [ 2917( 682): 2920( 683)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.701808 434971 task_exit.go:204] [ 2917( 682): 2920( 683)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.701847 434971 task_exit.go:204] [ 2917( 682): 2920( 683)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.701873 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.702963 434971 task_exit.go:204] [ 2917( 682): 2917( 682)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: socketpair(0xa, 0x3, 0x2a, &(0x7f00000000c0)) D0318 17:09:40.704173 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.704230 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 38 D0318 17:09:40.704275 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.704954 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.704988 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 36 D0318 17:09:40.705085 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.706570 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.706604 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 37 D0318 17:09:40.706617 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.708849 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.708929 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 39 D0318 17:09:40.709012 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.709284 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.709374 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 40 D0318 17:09:40.709449 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.709505 434971 usertrap_amd64.go:212] [ 2918( 116): 2922( 117)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.709528 434971 usertrap_amd64.go:122] [ 2918( 116): 2922( 117)] Allocate a new trap: 0xc0090982a0 41 D0318 17:09:40.709543 434971 usertrap_amd64.go:225] [ 2918( 116): 2922( 117)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.711406 434971 usertrap_amd64.go:212] [ 2918( 116): 2918( 116)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.711444 434971 usertrap_amd64.go:122] [ 2918( 116): 2918( 116)] Allocate a new trap: 0xc0090982a0 42 D0318 17:09:40.711460 434971 usertrap_amd64.go:225] [ 2918( 116): 2918( 116)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.711565 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.711660 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 37 D0318 17:09:40.711937 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.712491 434971 task_exit.go:204] [ 2918( 116): 2918( 116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.712552 434971 task_exit.go:204] [ 2918( 116): 2918( 116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.712589 434971 task_signals.go:204] [ 2918( 116): 2922( 117)] Signal 9, PID: 2918, TID: 2922, fault addr: 0x0: terminating thread group D0318 17:09:40.712622 434971 task_exit.go:204] [ 2918( 116): 2922( 117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.713053 434971 task_exit.go:204] [ 2918( 116): 2922( 117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.713140 434971 task_exit.go:204] [ 2918( 116): 2922( 117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.713224 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.713506 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.713544 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 38 D0318 17:09:40.713557 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.713550 434971 task_exit.go:204] [ 2918( 116): 2918( 116)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: prctl$PR_GET_SECCOMP(0x1c) D0318 17:09:40.714868 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.714906 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 38 D0318 17:09:40.714917 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.716104 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.716208 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 37 D0318 17:09:40.716338 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.718116 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.718193 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 39 D0318 17:09:40.718329 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.718227 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.718373 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 38 D0318 17:09:40.718383 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.718689 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.718845 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 40 D0318 17:09:40.718884 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.719106 434971 usertrap_amd64.go:212] [ 2919( 158): 2924( 159)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.719146 434971 usertrap_amd64.go:122] [ 2919( 158): 2924( 159)] Allocate a new trap: 0xc008160150 41 D0318 17:09:40.719158 434971 usertrap_amd64.go:225] [ 2919( 158): 2924( 159)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.719857 434971 usertrap_amd64.go:212] [ 2919( 158): 2919( 158)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.719894 434971 usertrap_amd64.go:122] [ 2919( 158): 2919( 158)] Allocate a new trap: 0xc008160150 42 D0318 17:09:40.720020 434971 usertrap_amd64.go:225] [ 2919( 158): 2919( 158)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.721218 434971 task_exit.go:204] [ 2919( 158): 2919( 158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.721284 434971 task_exit.go:204] [ 2919( 158): 2919( 158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.721593 434971 task_signals.go:204] [ 2919( 158): 2924( 159)] Signal 9, PID: 2919, TID: 2924, fault addr: 0x0: terminating thread group D0318 17:09:40.721647 434971 task_exit.go:204] [ 2919( 158): 2924( 159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.722002 434971 task_exit.go:204] [ 2919( 158): 2924( 159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.722039 434971 task_exit.go:204] [ 2919( 158): 2924( 159)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.722052 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.722889 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.722987 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 36 D0318 17:09:40.723283 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.723877 434971 task_exit.go:204] [ 2919( 158): 2919( 158)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.724283 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.724331 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 39 D0318 17:09:40.724346 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.724418 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.724465 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 37 D0318 17:09:40.724481 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) 17:09:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8941, &(0x7f0000000000)) D0318 17:09:40.726854 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.726925 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 39 D0318 17:09:40.726960 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.730392 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.730439 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 40 D0318 17:09:40.730458 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.730807 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.730932 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 38 D0318 17:09:40.731004 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.730815 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.731028 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 41 D0318 17:09:40.731044 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.730910 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.731102 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 40 D0318 17:09:40.731125 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.731145 434971 usertrap_amd64.go:212] [ 2923( 684): 2927( 685)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.731161 434971 usertrap_amd64.go:122] [ 2923( 684): 2927( 685)] Allocate a new trap: 0xc0005763f0 42 D0318 17:09:40.731171 434971 usertrap_amd64.go:225] [ 2923( 684): 2927( 685)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.731444 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.731591 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 41 D0318 17:09:40.731699 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.731749 434971 usertrap_amd64.go:212] [ 2921( 789): 2928( 790)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.731767 434971 usertrap_amd64.go:122] [ 2921( 789): 2928( 790)] Allocate a new trap: 0xc0083c8210 42 D0318 17:09:40.731776 434971 usertrap_amd64.go:225] [ 2921( 789): 2928( 790)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.732060 434971 usertrap_amd64.go:212] [ 2923( 684): 2923( 684)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.732090 434971 usertrap_amd64.go:122] [ 2923( 684): 2923( 684)] Allocate a new trap: 0xc0005763f0 43 D0318 17:09:40.732185 434971 usertrap_amd64.go:225] [ 2923( 684): 2923( 684)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.733604 434971 task_exit.go:204] [ 2923( 684): 2923( 684)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.733660 434971 task_exit.go:204] [ 2923( 684): 2923( 684)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.733682 434971 task_signals.go:204] [ 2923( 684): 2927( 685)] Signal 9, PID: 2923, TID: 2927, fault addr: 0x0: terminating thread group D0318 17:09:40.733697 434971 task_exit.go:204] [ 2923( 684): 2927( 685)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.734260 434971 task_exit.go:204] [ 2923( 684): 2927( 685)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.734282 434971 task_exit.go:204] [ 2923( 684): 2927( 685)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.734292 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.734663 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.734737 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 39 D0318 17:09:40.734805 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.735051 434971 task_exit.go:204] [ 2923( 684): 2923( 684)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.735308 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.735338 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 40 D0318 17:09:40.735348 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8934, &(0x7f0000000000)) D0318 17:09:40.735707 434971 usertrap_amd64.go:212] [ 2925( 118): 2929( 119)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.735726 434971 usertrap_amd64.go:122] [ 2925( 118): 2929( 119)] Allocate a new trap: 0xc0081601b0 41 D0318 17:09:40.735738 434971 usertrap_amd64.go:225] [ 2925( 118): 2929( 119)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.737557 434971 usertrap_amd64.go:212] [ 2925( 118): 2925( 118)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.737631 434971 usertrap_amd64.go:122] [ 2925( 118): 2925( 118)] Allocate a new trap: 0xc0081601b0 42 D0318 17:09:40.737667 434971 usertrap_amd64.go:225] [ 2925( 118): 2925( 118)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.738923 434971 task_exit.go:204] [ 2925( 118): 2925( 118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.738987 434971 task_exit.go:204] [ 2925( 118): 2925( 118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.739021 434971 task_signals.go:204] [ 2925( 118): 2929( 119)] Signal 9, PID: 2925, TID: 2929, fault addr: 0x0: terminating thread group D0318 17:09:40.739060 434971 task_exit.go:204] [ 2925( 118): 2929( 119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.739745 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.739826 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 36 D0318 17:09:40.739971 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.741645 434971 usertrap_amd64.go:212] [ 2921( 789): 2921( 789)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.741699 434971 usertrap_amd64.go:122] [ 2921( 789): 2921( 789)] Allocate a new trap: 0xc0083c8210 43 D0318 17:09:40.741718 434971 usertrap_amd64.go:225] [ 2921( 789): 2921( 789)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.742371 434971 task_exit.go:204] [ 2921( 789): 2921( 789)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.742417 434971 task_exit.go:204] [ 2921( 789): 2921( 789)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.742445 434971 task_signals.go:204] [ 2921( 789): 2928( 790)] Signal 9, PID: 2921, TID: 2928, fault addr: 0x0: terminating thread group D0318 17:09:40.742461 434971 task_exit.go:204] [ 2921( 789): 2928( 790)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.742926 434971 task_exit.go:204] [ 2921( 789): 2928( 790)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.742978 434971 task_exit.go:204] [ 2921( 789): 2928( 790)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.742994 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.743679 434971 task_exit.go:204] [ 2921( 789): 2921( 789)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.743864 434971 task_exit.go:204] [ 2925( 118): 2929( 119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.743966 434971 task_exit.go:204] [ 2925( 118): 2929( 119)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.744018 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.744068 434971 task_exit.go:204] [ 2925( 118): 2925( 118)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.745230 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.745263 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 37 D0318 17:09:40.745276 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) 17:09:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f00000000c0)=[{}, {0x8}]}) 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8940, &(0x7f0000000000)) D0318 17:09:40.747087 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.747124 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 37 D0318 17:09:40.747217 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.749139 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.749194 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 38 D0318 17:09:40.749215 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.750835 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.750935 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 38 D0318 17:09:40.750968 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.752886 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.753226 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 37 D0318 17:09:40.753446 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.755515 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.755585 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 39 D0318 17:09:40.755599 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.755989 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.756025 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 40 D0318 17:09:40.756040 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.756227 434971 usertrap_amd64.go:212] [ 2926( 160): 2932( 161)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.756261 434971 usertrap_amd64.go:122] [ 2926( 160): 2932( 161)] Allocate a new trap: 0xc00a07a270 41 D0318 17:09:40.756279 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.756305 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 38 D0318 17:09:40.756322 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.756301 434971 usertrap_amd64.go:225] [ 2926( 160): 2932( 161)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.756682 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.756772 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 39 D0318 17:09:40.756858 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.757239 434971 usertrap_amd64.go:212] [ 2926( 160): 2926( 160)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.757282 434971 usertrap_amd64.go:122] [ 2926( 160): 2926( 160)] Allocate a new trap: 0xc00a07a270 42 D0318 17:09:40.757296 434971 usertrap_amd64.go:225] [ 2926( 160): 2926( 160)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.759691 434971 task_exit.go:204] [ 2926( 160): 2926( 160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.759843 434971 task_exit.go:204] [ 2926( 160): 2926( 160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.759913 434971 task_signals.go:204] [ 2926( 160): 2932( 161)] Signal 9, PID: 2926, TID: 2932, fault addr: 0x0: terminating thread group D0318 17:09:40.759944 434971 task_exit.go:204] [ 2926( 160): 2932( 161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.760645 434971 task_exit.go:204] [ 2926( 160): 2932( 161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.760673 434971 task_exit.go:204] [ 2926( 160): 2932( 161)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.760685 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.761110 434971 task_exit.go:204] [ 2926( 160): 2926( 160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.761450 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.761558 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 40 D0318 17:09:40.761626 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) 17:09:40 executing program 0: socketpair(0x10, 0x2, 0x0, &(0x7f0000000540)) D0318 17:09:40.762027 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.762084 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 41 D0318 17:09:40.762102 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.762319 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.762336 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 39 D0318 17:09:40.762346 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.762930 434971 usertrap_amd64.go:212] [ 2930( 686): 2933( 687)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.762970 434971 usertrap_amd64.go:122] [ 2930( 686): 2933( 687)] Allocate a new trap: 0xc0015961b0 42 D0318 17:09:40.762987 434971 usertrap_amd64.go:225] [ 2930( 686): 2933( 687)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.763648 434971 usertrap_amd64.go:212] [ 2930( 686): 2930( 686)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.763855 434971 usertrap_amd64.go:122] [ 2930( 686): 2930( 686)] Allocate a new trap: 0xc0015961b0 43 D0318 17:09:40.763937 434971 usertrap_amd64.go:225] [ 2930( 686): 2930( 686)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.765114 434971 task_exit.go:204] [ 2930( 686): 2930( 686)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.765195 434971 task_exit.go:204] [ 2930( 686): 2930( 686)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.765218 434971 task_signals.go:204] [ 2930( 686): 2933( 687)] Signal 9, PID: 2930, TID: 2933, fault addr: 0x0: terminating thread group D0318 17:09:40.765245 434971 task_exit.go:204] [ 2930( 686): 2933( 687)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.765642 434971 task_exit.go:204] [ 2930( 686): 2933( 687)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.765679 434971 task_exit.go:204] [ 2930( 686): 2933( 687)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.765691 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.766008 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.766058 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 36 D0318 17:09:40.766059 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.766116 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 40 D0318 17:09:40.766141 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.766375 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.766412 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 41 D0318 17:09:40.766427 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.766635 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.766664 434971 task_exit.go:204] [ 2930( 686): 2930( 686)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.766708 434971 usertrap_amd64.go:212] [ 2931( 791): 2935( 792)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.766717 434971 usertrap_amd64.go:122] [ 2931( 791): 2935( 792)] Allocate a new trap: 0xc000576450 42 D0318 17:09:40.766738 434971 usertrap_amd64.go:225] [ 2931( 791): 2935( 792)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, &(0x7f00000001c0), &(0x7f0000000200)=0x14) D0318 17:09:40.767928 434971 sys_seccomp.go:78] [ 2931( 791): 2935( 792)] Invalid seccomp-bpf filter: at l1: last instruction must be a return D0318 17:09:40.768293 434971 usertrap_amd64.go:212] [ 2931( 791): 2931( 791)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.768334 434971 usertrap_amd64.go:122] [ 2931( 791): 2931( 791)] Allocate a new trap: 0xc000576450 43 D0318 17:09:40.768352 434971 usertrap_amd64.go:225] [ 2931( 791): 2931( 791)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.768421 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.768453 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 37 D0318 17:09:40.768466 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.769176 434971 task_exit.go:204] [ 2931( 791): 2931( 791)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.769291 434971 task_exit.go:204] [ 2931( 791): 2931( 791)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.769375 434971 task_signals.go:204] [ 2931( 791): 2935( 792)] Signal 9, PID: 2931, TID: 2935, fault addr: 0x0: terminating thread group D0318 17:09:40.769396 434971 task_exit.go:204] [ 2931( 791): 2935( 792)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.769755 434971 task_exit.go:204] [ 2931( 791): 2935( 792)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.769785 434971 task_exit.go:204] [ 2931( 791): 2935( 792)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.769798 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.770066 434971 task_exit.go:204] [ 2931( 791): 2931( 791)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x4000040) D0318 17:09:40.774182 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.774210 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 38 D0318 17:09:40.774223 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.777650 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.777697 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 39 D0318 17:09:40.777712 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.777857 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.777885 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 40 D0318 17:09:40.777900 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.778224 434971 usertrap_amd64.go:212] [ 2934( 120): 2937( 121)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.778257 434971 usertrap_amd64.go:122] [ 2934( 120): 2937( 121)] Allocate a new trap: 0xc0083c8300 41 D0318 17:09:40.778296 434971 usertrap_amd64.go:225] [ 2934( 120): 2937( 121)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.779074 434971 usertrap_amd64.go:212] [ 2934( 120): 2934( 120)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.779109 434971 usertrap_amd64.go:122] [ 2934( 120): 2934( 120)] Allocate a new trap: 0xc0083c8300 42 D0318 17:09:40.779120 434971 usertrap_amd64.go:225] [ 2934( 120): 2934( 120)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.780687 434971 task_exit.go:204] [ 2934( 120): 2934( 120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.780734 434971 task_exit.go:204] [ 2934( 120): 2934( 120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.780756 434971 task_signals.go:204] [ 2934( 120): 2937( 121)] Signal 9, PID: 2934, TID: 2937, fault addr: 0x0: terminating thread group D0318 17:09:40.780770 434971 task_exit.go:204] [ 2934( 120): 2937( 121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.780781 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.780832 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 37 D0318 17:09:40.780942 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.781239 434971 task_exit.go:204] [ 2934( 120): 2937( 121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.781283 434971 task_exit.go:204] [ 2934( 120): 2937( 121)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.781298 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.781652 434971 task_exit.go:204] [ 2934( 120): 2934( 120)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='mountstats\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x40305829, 0x0) D0318 17:09:40.782542 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.782659 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 38 D0318 17:09:40.782688 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.782719 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.782783 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 37 D0318 17:09:40.782984 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.784610 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.784682 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 38 D0318 17:09:40.784756 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.788398 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.788437 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 39 D0318 17:09:40.788457 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.790012 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.790054 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 36 D0318 17:09:40.790264 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.791412 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.791451 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 40 D0318 17:09:40.791466 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.791654 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.791756 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 41 D0318 17:09:40.791785 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.791785 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.791803 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 37 D0318 17:09:40.791815 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.792057 434971 usertrap_amd64.go:212] [ 2936( 793): 2941( 794)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.792087 434971 usertrap_amd64.go:122] [ 2936( 793): 2941( 794)] Allocate a new trap: 0xc008348120 42 D0318 17:09:40.792098 434971 usertrap_amd64.go:225] [ 2936( 793): 2941( 794)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.792392 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.792445 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 39 D0318 17:09:40.792470 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.793025 434971 usertrap_amd64.go:212] [ 2936( 793): 2936( 793)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.793056 434971 usertrap_amd64.go:122] [ 2936( 793): 2936( 793)] Allocate a new trap: 0xc008348120 43 D0318 17:09:40.793071 434971 usertrap_amd64.go:225] [ 2936( 793): 2936( 793)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.793613 434971 task_exit.go:204] [ 2936( 793): 2936( 793)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.793661 434971 task_exit.go:204] [ 2936( 793): 2936( 793)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.793687 434971 task_signals.go:204] [ 2936( 793): 2941( 794)] Signal 9, PID: 2936, TID: 2941, fault addr: 0x0: terminating thread group D0318 17:09:40.793701 434971 task_exit.go:204] [ 2936( 793): 2941( 794)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.794089 434971 task_exit.go:204] [ 2936( 793): 2941( 794)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.794443 434971 task_exit.go:204] [ 2936( 793): 2941( 794)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.794489 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.794570 434971 task_exit.go:204] [ 2936( 793): 2936( 793)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x25, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @timestamp], 0x4) D0318 17:09:40.796724 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.796768 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 36 D0318 17:09:40.796902 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.797019 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.797037 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 40 D0318 17:09:40.797048 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.797208 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.797238 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 41 D0318 17:09:40.797249 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.798005 434971 usertrap_amd64.go:212] [ 2938( 688): 2942( 689)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.798058 434971 usertrap_amd64.go:122] [ 2938( 688): 2942( 689)] Allocate a new trap: 0xc008058300 42 D0318 17:09:40.798074 434971 usertrap_amd64.go:225] [ 2938( 688): 2942( 689)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.798172 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.798204 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 38 D0318 17:09:40.798218 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.798914 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.798945 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 37 D0318 17:09:40.798955 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.799858 434971 usertrap_amd64.go:212] [ 2938( 688): 2938( 688)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.799979 434971 usertrap_amd64.go:122] [ 2938( 688): 2938( 688)] Allocate a new trap: 0xc008058300 43 D0318 17:09:40.800116 434971 usertrap_amd64.go:225] [ 2938( 688): 2938( 688)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.802140 434971 task_exit.go:204] [ 2938( 688): 2938( 688)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.802327 434971 task_signals.go:204] [ 2938( 688): 2942( 689)] Signal 9, PID: 2938, TID: 2942, fault addr: 0x0: terminating thread group D0318 17:09:40.802390 434971 task_exit.go:204] [ 2938( 688): 2938( 688)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.802482 434971 task_exit.go:204] [ 2938( 688): 2942( 689)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.803079 434971 task_exit.go:204] [ 2938( 688): 2942( 689)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.803189 434971 task_exit.go:204] [ 2938( 688): 2942( 689)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.803238 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.803427 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.803459 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 39 D0318 17:09:40.803485 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.803712 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.803742 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 40 D0318 17:09:40.803752 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.803970 434971 usertrap_amd64.go:212] [ 2939( 122): 2944( 123)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.803999 434971 usertrap_amd64.go:122] [ 2939( 122): 2944( 123)] Allocate a new trap: 0xc00a07a2a0 41 D0318 17:09:40.804013 434971 usertrap_amd64.go:225] [ 2939( 122): 2944( 123)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.804329 434971 task_exit.go:204] [ 2938( 688): 2938( 688)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000e40), 0x0) D0318 17:09:40.804886 434971 usertrap_amd64.go:212] [ 2939( 122): 2944( 123)] Found the pattern at ip 5559c9ffb999:sysno 257 D0318 17:09:40.804909 434971 usertrap_amd64.go:122] [ 2939( 122): 2944( 123)] Allocate a new trap: 0xc00a07a2a0 42 D0318 17:09:40.804929 434971 usertrap_amd64.go:225] [ 2939( 122): 2944( 123)] Apply the binary patch addr 5559c9ffb999 trap addr 66d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.805406 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.805532 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 37 D0318 17:09:40.805563 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.805584 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 38 D0318 17:09:40.805614 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.805652 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.806892 434971 usertrap_amd64.go:212] [ 2939( 122): 2939( 122)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.807042 434971 usertrap_amd64.go:122] [ 2939( 122): 2939( 122)] Allocate a new trap: 0xc00a07a2a0 43 D0318 17:09:40.807162 434971 usertrap_amd64.go:225] [ 2939( 122): 2939( 122)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 17:09:40.807592 434971 task_exit.go:204] [ 2939( 122): 2939( 122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.807690 434971 task_exit.go:204] [ 2939( 122): 2939( 122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.807723 434971 task_signals.go:204] [ 2939( 122): 2944( 123)] Signal 9, PID: 2939, TID: 2944, fault addr: 0x0: terminating thread group D0318 17:09:40.807751 434971 task_exit.go:204] [ 2939( 122): 2944( 123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.807846 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.807875 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 38 D0318 17:09:40.807886 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.808148 434971 task_exit.go:204] [ 2939( 122): 2944( 123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.808166 434971 task_exit.go:204] [ 2939( 122): 2944( 123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.808177 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.808192 434971 task_exit.go:204] [ 2939( 122): 2939( 122)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x3, 0x0, &(0x7f0000000200)) D0318 17:09:40.810050 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.810084 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 39 D0318 17:09:40.810098 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.810297 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.810370 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 40 D0318 17:09:40.810443 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.810871 434971 usertrap_amd64.go:212] [ 2940( 162): 2946( 163)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.810901 434971 usertrap_amd64.go:122] [ 2940( 162): 2946( 163)] Allocate a new trap: 0xc008058330 41 D0318 17:09:40.810916 434971 usertrap_amd64.go:225] [ 2940( 162): 2946( 163)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.811343 434971 usertrap_amd64.go:212] [ 2940( 162): 2940( 162)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.811371 434971 usertrap_amd64.go:122] [ 2940( 162): 2940( 162)] Allocate a new trap: 0xc008058330 42 D0318 17:09:40.811386 434971 usertrap_amd64.go:225] [ 2940( 162): 2940( 162)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.812469 434971 task_exit.go:204] [ 2940( 162): 2940( 162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.812525 434971 task_exit.go:204] [ 2940( 162): 2940( 162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.812562 434971 task_signals.go:204] [ 2940( 162): 2946( 163)] Signal 9, PID: 2940, TID: 2946, fault addr: 0x0: terminating thread group D0318 17:09:40.812579 434971 task_exit.go:204] [ 2940( 162): 2946( 163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.812927 434971 task_exit.go:204] [ 2940( 162): 2946( 163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.812955 434971 task_exit.go:204] [ 2940( 162): 2946( 163)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.812978 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.813381 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.813510 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 39 D0318 17:09:40.813552 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.813548 434971 task_exit.go:204] [ 2940( 162): 2940( 162)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.813717 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.813748 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 37 D0318 17:09:40.813813 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) 17:09:40 executing program 0: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000400)) D0318 17:09:40.816113 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.816162 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 38 D0318 17:09:40.816183 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.822198 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.822231 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 40 D0318 17:09:40.822243 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.822494 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.822520 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 41 D0318 17:09:40.822530 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.822790 434971 usertrap_amd64.go:212] [ 2943( 795): 2947( 796)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.822819 434971 usertrap_amd64.go:122] [ 2943( 795): 2947( 796)] Allocate a new trap: 0xc008160210 42 D0318 17:09:40.822873 434971 usertrap_amd64.go:225] [ 2943( 795): 2947( 796)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.824303 434971 usertrap_amd64.go:212] [ 2943( 795): 2943( 795)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.824368 434971 usertrap_amd64.go:122] [ 2943( 795): 2943( 795)] Allocate a new trap: 0xc008160210 43 D0318 17:09:40.824389 434971 usertrap_amd64.go:225] [ 2943( 795): 2943( 795)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.825107 434971 task_exit.go:204] [ 2943( 795): 2943( 795)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.825186 434971 task_exit.go:204] [ 2943( 795): 2943( 795)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.825210 434971 task_signals.go:204] [ 2943( 795): 2947( 796)] Signal 9, PID: 2943, TID: 2947, fault addr: 0x0: terminating thread group D0318 17:09:40.825236 434971 task_exit.go:204] [ 2943( 795): 2947( 796)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.825309 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.825337 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 39 D0318 17:09:40.825351 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.825613 434971 task_exit.go:204] [ 2943( 795): 2947( 796)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.825651 434971 task_exit.go:204] [ 2943( 795): 2947( 796)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.825664 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.826824 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.827021 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 36 D0318 17:09:40.827293 434971 task_exit.go:204] [ 2943( 795): 2943( 795)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) D0318 17:09:40.828614 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.829975 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.830012 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 37 D0318 17:09:40.830025 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.830276 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.830314 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 36 D0318 17:09:40.830412 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.832095 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.832132 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 37 D0318 17:09:40.832153 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.833930 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.833964 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 40 D0318 17:09:40.833978 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.834254 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.834287 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 41 D0318 17:09:40.834304 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.834504 434971 usertrap_amd64.go:212] [ 2945( 690): 2950( 691)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.834593 434971 usertrap_amd64.go:122] [ 2945( 690): 2950( 691)] Allocate a new trap: 0xc008058360 42 D0318 17:09:40.834613 434971 usertrap_amd64.go:225] [ 2945( 690): 2950( 691)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.835055 434971 usertrap_amd64.go:212] [ 2945( 690): 2945( 690)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.835105 434971 usertrap_amd64.go:122] [ 2945( 690): 2945( 690)] Allocate a new trap: 0xc008058360 43 D0318 17:09:40.835121 434971 usertrap_amd64.go:225] [ 2945( 690): 2945( 690)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.836060 434971 task_exit.go:204] [ 2945( 690): 2945( 690)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.836140 434971 task_exit.go:204] [ 2945( 690): 2945( 690)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.836195 434971 task_signals.go:204] [ 2945( 690): 2950( 691)] Signal 9, PID: 2945, TID: 2950, fault addr: 0x0: terminating thread group D0318 17:09:40.836281 434971 task_exit.go:204] [ 2945( 690): 2950( 691)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.836686 434971 task_exit.go:204] [ 2945( 690): 2950( 691)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.836768 434971 task_exit.go:204] [ 2945( 690): 2950( 691)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.836855 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.837380 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.837424 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 38 D0318 17:09:40.837436 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.838579 434971 task_exit.go:204] [ 2945( 690): 2945( 690)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3, &(0x7f0000000ec0)=0x0) io_submit(r1, 0x2, &(0x7f0000001440)=[&(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) D0318 17:09:40.840658 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.840687 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 39 D0318 17:09:40.840698 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.840904 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.840937 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 40 D0318 17:09:40.840952 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.841000 434971 usertrap_amd64.go:212] [ 2949( 164): 2952( 165)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.841008 434971 usertrap_amd64.go:122] [ 2949( 164): 2952( 165)] Allocate a new trap: 0xc000d142d0 41 D0318 17:09:40.841017 434971 usertrap_amd64.go:225] [ 2949( 164): 2952( 165)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.841652 434971 usertrap_amd64.go:212] [ 2949( 164): 2949( 164)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.841681 434971 usertrap_amd64.go:122] [ 2949( 164): 2949( 164)] Allocate a new trap: 0xc000d142d0 42 D0318 17:09:40.841692 434971 usertrap_amd64.go:225] [ 2949( 164): 2949( 164)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.843035 434971 task_exit.go:204] [ 2949( 164): 2949( 164)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.843093 434971 task_signals.go:204] [ 2949( 164): 2952( 165)] Signal 9, PID: 2949, TID: 2952, fault addr: 0x0: terminating thread group D0318 17:09:40.843107 434971 task_exit.go:204] [ 2949( 164): 2949( 164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.843144 434971 task_exit.go:204] [ 2949( 164): 2952( 165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.843535 434971 task_exit.go:204] [ 2949( 164): 2952( 165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.843644 434971 task_exit.go:204] [ 2949( 164): 2952( 165)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.843746 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.844771 434971 task_exit.go:204] [ 2949( 164): 2949( 164)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.845523 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.845615 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 37 17:09:40 executing program 0: pipe2$watch_queue(&(0x7f0000000640), 0xeb6ef86500000000) D0318 17:09:40.845739 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.846955 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.846988 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 38 D0318 17:09:40.847004 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.847534 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.847651 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 37 D0318 17:09:40.847935 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.849467 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.849554 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 38 D0318 17:09:40.849625 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) D0318 17:09:40.850179 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.850209 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 38 D0318 17:09:40.850221 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.851247 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.851280 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 39 D0318 17:09:40.851295 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.853422 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.853460 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 39 D0318 17:09:40.853474 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.853770 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.853801 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 40 D0318 17:09:40.853813 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.853866 434971 usertrap_amd64.go:212] [ 2948( 124): 2955( 125)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.853900 434971 usertrap_amd64.go:122] [ 2948( 124): 2955( 125)] Allocate a new trap: 0xc008160240 41 D0318 17:09:40.853914 434971 usertrap_amd64.go:225] [ 2948( 124): 2955( 125)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.854902 434971 usertrap_amd64.go:212] [ 2948( 124): 2948( 124)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.854934 434971 usertrap_amd64.go:122] [ 2948( 124): 2948( 124)] Allocate a new trap: 0xc008160240 42 D0318 17:09:40.854948 434971 usertrap_amd64.go:225] [ 2948( 124): 2948( 124)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.855019 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.855036 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 39 D0318 17:09:40.855048 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.856933 434971 task_exit.go:204] [ 2948( 124): 2948( 124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.856991 434971 task_exit.go:204] [ 2948( 124): 2948( 124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.857015 434971 task_signals.go:204] [ 2948( 124): 2955( 125)] Signal 9, PID: 2948, TID: 2955, fault addr: 0x0: terminating thread group D0318 17:09:40.857033 434971 task_exit.go:204] [ 2948( 124): 2955( 125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.857347 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d916860:sysno 109 D0318 17:09:40.857386 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 36 D0318 17:09:40.857397 434971 task_exit.go:204] [ 2948( 124): 2955( 125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.857414 434971 task_exit.go:204] [ 2948( 124): 2955( 125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.857425 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.857575 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d916860 trap addr 65b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 91 6 0]) D0318 17:09:40.857653 434971 task_exit.go:204] [ 2948( 124): 2948( 124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.858931 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.858964 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 40 D0318 17:09:40.858979 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.859187 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.859218 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 40 D0318 17:09:40.859259 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.859295 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 41 D0318 17:09:40.859313 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.859229 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.859362 434971 usertrap_amd64.go:212] [ 2951( 797): 2956( 798)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.859390 434971 usertrap_amd64.go:122] [ 2951( 797): 2956( 798)] Allocate a new trap: 0xc0081602a0 42 D0318 17:09:40.859401 434971 usertrap_amd64.go:225] [ 2951( 797): 2956( 798)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) 17:09:40 executing program 1: prctl$PR_GET_SECCOMP(0x43) D0318 17:09:40.859810 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.859850 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 41 D0318 17:09:40.859868 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.859982 434971 usertrap_amd64.go:212] [ 2953( 692): 2957( 693)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.860022 434971 usertrap_amd64.go:122] [ 2953( 692): 2957( 693)] Allocate a new trap: 0xc001194150 42 D0318 17:09:40.860038 434971 usertrap_amd64.go:225] [ 2953( 692): 2957( 693)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.860060 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d8ea520:sysno 266 D0318 17:09:40.860076 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 37 D0318 17:09:40.860086 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d8ea520 trap addr 65b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.860575 434971 usertrap_amd64.go:212] [ 2951( 797): 2951( 797)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.860608 434971 usertrap_amd64.go:122] [ 2951( 797): 2951( 797)] Allocate a new trap: 0xc0081602a0 43 D0318 17:09:40.860620 434971 usertrap_amd64.go:225] [ 2951( 797): 2951( 797)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.861707 434971 task_exit.go:204] [ 2951( 797): 2951( 797)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.861855 434971 task_exit.go:204] [ 2951( 797): 2951( 797)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.862266 434971 task_signals.go:204] [ 2951( 797): 2956( 798)] Signal 9, PID: 2951, TID: 2956, fault addr: 0x0: terminating thread group D0318 17:09:40.862291 434971 task_exit.go:204] [ 2951( 797): 2956( 798)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.862804 434971 task_exit.go:204] [ 2951( 797): 2956( 798)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.862854 434971 task_exit.go:204] [ 2951( 797): 2956( 798)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.862871 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.863988 434971 task_exit.go:204] [ 2951( 797): 2951( 797)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.864371 434971 usertrap_amd64.go:212] [ 2953( 692): 2953( 692)] Found the pattern at ip 55dfedfb0c93:sysno 3 D0318 17:09:40.864519 434971 usertrap_amd64.go:122] [ 2953( 692): 2953( 692)] Allocate a new trap: 0xc001194150 43 D0318 17:09:40.864563 434971 usertrap_amd64.go:225] [ 2953( 692): 2953( 692)] Apply the binary patch addr 55dfedfb0c93 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0318 17:09:40.865732 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d8bfca2:sysno 14 D0318 17:09:40.865771 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 38 D0318 17:09:40.865788 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d8bfca2 trap addr 65be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 91 6 0]) 17:09:40 executing program 3: syz_clone(0x28b07000, 0x0, 0x0, 0x0, 0x0, 0x0) D0318 17:09:40.865741 434971 task_exit.go:204] [ 2953( 692): 2953( 692)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.865994 434971 task_exit.go:204] [ 2953( 692): 2953( 692)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.866024 434971 task_signals.go:204] [ 2953( 692): 2957( 693)] Signal 9, PID: 2953, TID: 2957, fault addr: 0x0: terminating thread group D0318 17:09:40.866037 434971 task_exit.go:204] [ 2953( 692): 2957( 693)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.866461 434971 task_exit.go:204] [ 2953( 692): 2957( 693)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.866820 434971 task_exit.go:204] [ 2953( 692): 2957( 693)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.866841 434971 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 17:09:40.866908 434971 task_exit.go:204] [ 2953( 692): 2953( 692)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000100), 0x4) D0318 17:09:40.868465 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559ca028860:sysno 109 D0318 17:09:40.868503 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 36 D0318 17:09:40.868737 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559ca028860 trap addr 66b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 107 6 0]) D0318 17:09:40.870228 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559c9ffc520:sysno 266 D0318 17:09:40.870329 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 37 D0318 17:09:40.870350 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559c9ffc520 trap addr 66b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 17:09:40.875098 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559c9fd1ca2:sysno 14 D0318 17:09:40.875137 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 38 D0318 17:09:40.875151 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559c9fd1ca2 trap addr 66be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 17:09:40.879562 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.879644 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 37 D0318 17:09:40.879720 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.880136 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d916b92:sysno 435 D0318 17:09:40.880163 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 39 D0318 17:09:40.880178 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d916b92 trap addr 65c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.880515 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d8bfc10:sysno 14 D0318 17:09:40.880531 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 40 D0318 17:09:40.880542 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d8bfc10 trap addr 65c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.881209 434971 usertrap_amd64.go:212] [ 2954( 166): 2961( 167)] Found the pattern at ip 55857d8bf320:sysno 273 D0318 17:09:40.881263 434971 usertrap_amd64.go:122] [ 2954( 166): 2961( 167)] Allocate a new trap: 0xc008348150 41 D0318 17:09:40.881280 434971 usertrap_amd64.go:225] [ 2954( 166): 2961( 167)] Apply the binary patch addr 55857d8bf320 trap addr 65cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.881537 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.881635 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 38 D0318 17:09:40.881711 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) D0318 17:09:40.881996 434971 usertrap_amd64.go:212] [ 2954( 166): 2954( 166)] Found the pattern at ip 55857d8e9c93:sysno 3 D0318 17:09:40.882025 434971 usertrap_amd64.go:122] [ 2954( 166): 2954( 166)] Allocate a new trap: 0xc008348150 42 D0318 17:09:40.882035 434971 usertrap_amd64.go:225] [ 2954( 166): 2954( 166)] Apply the binary patch addr 55857d8e9c93 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.883288 434971 task_exit.go:204] [ 2954( 166): 2954( 166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.883346 434971 task_exit.go:204] [ 2954( 166): 2954( 166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.883395 434971 task_signals.go:204] [ 2954( 166): 2961( 167)] Signal 9, PID: 2954, TID: 2961, fault addr: 0x0: terminating thread group D0318 17:09:40.883418 434971 task_exit.go:204] [ 2954( 166): 2961( 167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.884058 434971 task_exit.go:204] [ 2954( 166): 2961( 167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.884101 434971 task_exit.go:204] [ 2954( 166): 2961( 167)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.884115 434971 task_signals.go:443] [ 2311( 1): 2311( 1)] Discarding ignored signal 17 D0318 17:09:40.884335 434971 task_exit.go:204] [ 2954( 166): 2954( 166)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 0: socketpair(0x10, 0x2, 0x7fff, &(0x7f0000000540)) D0318 17:09:40.886472 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843dd5ca2:sysno 14 D0318 17:09:40.886508 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 39 D0318 17:09:40.886522 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843dd5ca2 trap addr 65c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0318 17:09:40.889644 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843e2cb92:sysno 435 D0318 17:09:40.889660 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559ca028b92:sysno 435 D0318 17:09:40.889702 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 39 D0318 17:09:40.889724 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559ca028b92 trap addr 66c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 17:09:40.889685 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 40 D0318 17:09:40.889757 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843e2cb92 trap addr 65c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0318 17:09:40.890001 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559c9fd1c10:sysno 14 D0318 17:09:40.890040 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 40 D0318 17:09:40.890054 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559c9fd1c10 trap addr 66c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 17:09:40.890185 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843dd5c10:sysno 14 D0318 17:09:40.890214 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 41 D0318 17:09:40.890225 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843dd5c10 trap addr 65cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0318 17:09:40.890351 434971 usertrap_amd64.go:212] [ 2958( 126): 2962( 127)] Found the pattern at ip 5559c9fd1320:sysno 273 D0318 17:09:40.890376 434971 usertrap_amd64.go:122] [ 2958( 126): 2962( 127)] Allocate a new trap: 0xc001194180 41 D0318 17:09:40.890384 434971 usertrap_amd64.go:225] [ 2958( 126): 2962( 127)] Apply the binary patch addr 5559c9fd1320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 17:09:40.890567 434971 usertrap_amd64.go:212] [ 2959( 799): 2963( 800)] Found the pattern at ip 555843dd5320:sysno 273 D0318 17:09:40.890668 434971 usertrap_amd64.go:122] [ 2959( 799): 2963( 800)] Allocate a new trap: 0xc000b1c240 42 D0318 17:09:40.890691 434971 usertrap_amd64.go:225] [ 2959( 799): 2963( 800)] Apply the binary patch addr 555843dd5320 trap addr 65d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0318 17:09:40.891098 434971 usertrap_amd64.go:212] [ 2959( 799): 2959( 799)] Found the pattern at ip 555843dffc93:sysno 3 D0318 17:09:40.891181 434971 usertrap_amd64.go:122] [ 2959( 799): 2959( 799)] Allocate a new trap: 0xc000b1c240 43 D0318 17:09:40.891213 434971 usertrap_amd64.go:225] [ 2959( 799): 2959( 799)] Apply the binary patch addr 555843dffc93 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0318 17:09:40.891232 434971 usertrap_amd64.go:212] [ 2960( 694): 2960( 694)] Found the pattern at ip 55dfedfdd860:sysno 109 D0318 17:09:40.891308 434971 usertrap_amd64.go:122] [ 2960( 694): 2960( 694)] Allocate a new trap: 0xc001596210 37 D0318 17:09:40.891419 434971 usertrap_amd64.go:225] [ 2960( 694): 2960( 694)] Apply the binary patch addr 55dfedfdd860 trap addr 64b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 75 6 0]) D0318 17:09:40.891720 434971 usertrap_amd64.go:212] [ 2958( 126): 2958( 126)] Found the pattern at ip 5559c9ffbc93:sysno 3 D0318 17:09:40.891767 434971 usertrap_amd64.go:122] [ 2958( 126): 2958( 126)] Allocate a new trap: 0xc001194180 42 D0318 17:09:40.891781 434971 usertrap_amd64.go:225] [ 2958( 126): 2958( 126)] Apply the binary patch addr 5559c9ffbc93 trap addr 66d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 17:09:40.892173 434971 task_exit.go:204] [ 2959( 799): 2959( 799)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.892240 434971 task_exit.go:204] [ 2959( 799): 2959( 799)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.892271 434971 task_signals.go:204] [ 2959( 799): 2963( 800)] Signal 9, PID: 2959, TID: 2963, fault addr: 0x0: terminating thread group D0318 17:09:40.892300 434971 task_exit.go:204] [ 2959( 799): 2963( 800)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.892711 434971 task_exit.go:204] [ 2959( 799): 2963( 800)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.892749 434971 task_exit.go:204] [ 2959( 799): 2963( 800)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.892763 434971 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 17:09:40.893141 434971 task_exit.go:204] [ 2959( 799): 2959( 799)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.893595 434971 usertrap_amd64.go:212] [ 2960( 694): 2960( 694)] Found the pattern at ip 55dfedfb1520:sysno 266 D0318 17:09:40.893670 434971 usertrap_amd64.go:122] [ 2960( 694): 2960( 694)] Allocate a new trap: 0xc001596210 38 D0318 17:09:40.893691 434971 usertrap_amd64.go:225] [ 2960( 694): 2960( 694)] Apply the binary patch addr 55dfedfb1520 trap addr 64be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 75 6 0]) 17:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8917, &(0x7f0000000000)) D0318 17:09:40.894839 434971 task_exit.go:204] [ 2958( 126): 2958( 126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.894896 434971 task_exit.go:204] [ 2958( 126): 2958( 126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.894924 434971 task_signals.go:204] [ 2958( 126): 2962( 127)] Signal 9, PID: 2958, TID: 2962, fault addr: 0x0: terminating thread group D0318 17:09:40.894938 434971 task_exit.go:204] [ 2958( 126): 2962( 127)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 17:09:40.895249 434971 task_exit.go:204] [ 2958( 126): 2962( 127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 17:09:40.895268 434971 task_exit.go:204] [ 2958( 126): 2962( 127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 17:09:40.895276 434971 task_signals.go:443] [ 2492( 1): 2492( 1)] Discarding ignored signal 17 D0318 17:09:40.895919 434971 task_exit.go:204] [ 2958( 126): 2958( 126)] Transitioning from exit state TaskExitZombie to TaskExitDead 17:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x8, &(0x7f0000000240)=@gcm_256={{}, "915f4e122941a0af", "aa7ff23420aeb85f99d26010bf4d39d06dc0853553ae215f814b22340dc6cc89", "82d2a2a1", "d7beaad1557ee70a"}, 0x38) D0318 17:09:40.899411 434971 usertrap_amd64.go:212] [ 2960( 694): 2960( 694)] Found the pattern at ip 55dfedf86ca2:sysno 14 D0318 17:09:40.899450 434971 usertrap_amd64.go:122] [ 2960( 694): 2960( 694)] Allocate a new trap: 0xc001596210 39 D0318 17:09:40.899465 434971 usertrap_amd64.go:225] [ 2960( 694): 2960( 694)] Apply the binary patch addr 55dfedf86ca2 trap addr 64c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 76 6 0]) D0318 17:09:40.902490 434971 usertrap_amd64.go:212] [ 2965( 801): 2965( 801)] Found the pattern at ip 555843e2c860:sysno 109 D0318 17:09:40.902538 434971 usertrap_amd64.go:122] [ 2965( 801): 2965( 801)] Allocate a new trap: 0xc0084c2000 37 D0318 17:09:40.902499 434971 usertrap_amd64.go:212] [ 2960( 694): 2960( 694)] Found the pattern at ip 55dfedfddb92:sysno 435 D0318 17:09:40.902640 434971 usertrap_amd64.go:122] [ 2960( 694): 2960( 694)] Allocate a new trap: 0xc001596210 40 D0318 17:09:40.902658 434971 usertrap_amd64.go:225] [ 2960( 694): 2960( 694)] Apply the binary patch addr 55dfedfddb92 trap addr 64c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 76 6 0]) D0318 17:09:40.902686 434971 usertrap_amd64.go:225] [ 2965( 801): 2965( 801)] Apply the binary patch addr 555843e2c860 trap addr 65b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 91 6 0]) D0318 17:09:40.902970 434971 usertrap_amd64.go:212] [ 2960( 694): 2960( 694)] Found the pattern at ip 55dfedf86c10:sysno 14 D0318 17:09:40.903003 434971 usertrap_amd64.go:122] [ 2960( 694): 2960( 694)] Allocate a new trap: 0xc001596210 41 D0318 17:09:40.903021 434971 usertrap_amd64.go:225] [ 2960( 694): 2960( 694)] Apply the binary patch addr 55dfedf86c10 trap addr 64cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 76 6 0]) D0318 17:09:40.903157 434971 usertrap_amd64.go:212] [ 2960( 694): 2966( 695)] Found the pattern at ip 55dfedf86320:sysno 273 D0318 17:09:40.903183 434971 usertrap_amd64.go:122] [ 2960( 694): 2966( 695)] Allocate a new trap: 0xc001596210 42 D0318 17:09:40.903204 434971 usertrap_amd64.go:225] [ 2960( 694): 2966( 695)] Apply the binary patch addr 55dfedf86320 trap addr 64d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 77 6 0]) D0318 17:09:40.904052 434971 usertrap_amd64.go:212] [ 2965( 801): 2965( 801)] Found the pattern at ip 555843e00520:sysno 266 D0318 17:09:40.904108 434971 usertrap_amd64.go:122] [ 2965( 801): 2965( 801)] Allocate a new trap: 0xc0084c2000 38 D0318 17:09:40.904152 434971 usertrap_amd64.go:225] [ 2965( 801): 2965( 801)] Apply the binary patch addr 555843e00520 trap addr 65be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 91 6 0]) panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x2d8 pc=0xa50087] goroutine 8592 gp=0xc000beaa80 m=18 mp=0xc000980008 [running]: panic({0x10e0dc0?, 0x1f3a290?}) GOROOT/src/runtime/panic.go:779 +0x158 fp=0xc000f45680 sp=0xc000f455d0 pc=0x43cb78 runtime.panicmem(...) GOROOT/src/runtime/panic.go:261 runtime.sigpanic() GOROOT/src/runtime/signal_unix.go:881 +0x378 fp=0xc000f456e0 sp=0xc000f45680 pc=0x456578 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*endpoint).OnCorkOptionSet(0xc0028db508, 0xd8?) pkg/tcpip/transport/tcp/endpoint.go:1766 +0x67 fp=0xc000f45720 sp=0xc000f456e0 pc=0xa50087 gvisor.dev/gvisor/pkg/tcpip.(*SocketOptions).SetCorkOption(0x150bee8?, 0x40?) pkg/tcpip/socketops.go:474 +0x24 fp=0xc000f45740 sp=0xc000f45720 pc=0x65abe4 gvisor.dev/gvisor/pkg/sentry/socket/netstack.setSockOptTCP(0xc001aae008?, {0x150bee8?, 0xc005f5cb40?}, {0x7f7f8767c180, 0xc0028db508}, 0x3, {0xc00230493c, 0x4, 0xc001aac008?}) pkg/sentry/socket/netstack/netstack.go:2015 +0x135 fp=0xc000f45780 sp=0xc000f45740 pc=0xaca0d5 gvisor.dev/gvisor/pkg/sentry/socket/netstack.SetSockOpt(0x8359a0?, {0x150bee8?, 0xc005f5cb40?}, {0x7f7f8767c180?, 0xc0028db508?}, 0xc002304008?, 0xc000f45870?, {0xc00230493c, 0x4, 0x90}) pkg/sentry/socket/netstack/netstack.go:1765 +0xbc fp=0xc000f457d8 sp=0xc000f45780 pc=0xac94dc gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).SetSockOpt(0xc005f5cb40, 0xc002304008?, 0x6?, 0x3?, {0xc00230493c, 0x4?, 0x90?}) pkg/sentry/socket/netstack/netstack.go:611 +0x235 fp=0xc000f45880 sp=0xc000f457d8 pc=0xac3e75 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.SetSockOpt(0xc002304008, 0x55dfede00000?, {{0x3}, {0x6}, {0x3}, {0x20000100}, {0x4}, {0x0}}) pkg/sentry/syscalls/linux/sys_socket.go:551 +0x266 fp=0xc000f45960 sp=0xc000f45880 pc=0xb4e626 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc002304008, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000100}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:143 +0x673 fp=0xc000f45ca0 sp=0xc000f45960 pc=0x9c5433 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc002304008, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000100}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:323 +0x45 fp=0xc000f45cf8 sp=0xc000f45ca0 pc=0x9c65a5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc002304008, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000100}, {0x4}, {0x0}}) pkg/sentry/kernel/task_syscall.go:283 +0x65 fp=0xc000f45d48 sp=0xc000f45cf8 pc=0x9c62a5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00185e000?) pkg/sentry/kernel/task_syscall.go:258 +0x2a5 fp=0xc000f45e30 sp=0xc000f45d48 pc=0x9c6025 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc007b00e10?, 0xc002304008) pkg/sentry/kernel/task_run.go:263 +0xef7 fp=0xc000f45f48 sp=0xc000f45e30 pc=0x9ba517 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc002304008, 0xb96) pkg/sentry/kernel/task_run.go:98 +0x1e2 fp=0xc000f45fc0 sp=0xc000f45f48 pc=0x9b8fa2 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.gowrap1() pkg/sentry/kernel/task_start.go:390 +0x25 fp=0xc000f45fe0 sp=0xc000f45fc0 pc=0x9c3d25 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000f45fe8 sp=0xc000f45fe0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start in goroutine 8588 pkg/sentry/kernel/task_start.go:390 +0xe5 goroutine 1 gp=0xc0000061c0 m=nil [semacquire]: runtime.gopark(0xc0004af558?, 0xc0002970e0?, 0xe0?, 0x73?, 0xc000787578?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000a1b528 sp=0xc000a1b508 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.semacquire1(0xc00039e120, 0x0, 0x1, 0x0, 0x12) GOROOT/src/runtime/sema.go:160 +0x225 fp=0xc000a1b590 sp=0xc000a1b528 pc=0x4536e5 sync.runtime_Semacquire(0xc00003e248?) GOROOT/src/runtime/sema.go:62 +0x25 fp=0xc000a1b5c8 sp=0xc000a1b590 pc=0x474605 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x48 fp=0xc000a1b5f0 sp=0xc000a1b5c8 pc=0x486168 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1265 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc00003e248) runsc/boot/loader.go:1297 +0x28 fp=0xc000a1b608 sp=0xc000a1b5f0 pc=0xe8b748 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000398000, {0xc0001bc0f8?, 0x106a880?}, 0xc00039fc70, {0xc000199b40, 0x2, 0x20?}) runsc/cmd/boot.go:507 +0x1add fp=0xc000a1bce8 sp=0xc000a1b608 pc=0xfa1b9d github.com/google/subcommands.(*Commander).Execute(0xc0001ee000, {0x14ebaa0, 0x1fce3e0}, {0xc000199b40, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x335 fp=0xc000a1bd80 sp=0xc000a1bce8 pc=0x51d635 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:221 +0x1408 fp=0xc000a1bf40 sp=0xc000a1bd80 pc=0xfd0a88 main.main() runsc/main.go:31 +0xf fp=0xc000a1bf50 sp=0xc000a1bf40 pc=0xfd18cf runtime.main() GOROOT/src/runtime/proc.go:271 +0x29d fp=0xc000a1bfe0 sp=0xc000a1bf50 pc=0x44019d runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000a1bfe8 sp=0xc000a1bfe0 pc=0x478c41 goroutine 2 gp=0xc000006700 m=nil [force gc (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000134fa8 sp=0xc000134f88 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.forcegchelper() GOROOT/src/runtime/proc.go:326 +0xb3 fp=0xc000134fe0 sp=0xc000134fa8 pc=0x440453 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000134fe8 sp=0xc000134fe0 pc=0x478c41 created by runtime.init.6 in goroutine 1 GOROOT/src/runtime/proc.go:314 +0x1a goroutine 17 gp=0xc000182380 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000130780 sp=0xc000130760 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.bgsweep(0xc000194000) GOROOT/src/runtime/mgcsweep.go:318 +0xdf fp=0xc0001307c8 sp=0xc000130780 pc=0x42a15f runtime.gcenable.gowrap1() GOROOT/src/runtime/mgc.go:203 +0x25 fp=0xc0001307e0 sp=0xc0001307c8 pc=0x41ea65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001307e8 sp=0xc0001307e0 pc=0x478c41 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:203 +0x66 goroutine 18 gp=0xc000182540 m=nil [GC scavenge wait]: runtime.gopark(0x1f6a5a0?, 0x14d2d88?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000130f78 sp=0xc000130f58 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x1f6a5a0) GOROOT/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc000130fa8 sp=0xc000130f78 pc=0x427b09 runtime.bgscavenge(0xc000194000) GOROOT/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc000130fc8 sp=0xc000130fa8 pc=0x4280b9 runtime.gcenable.gowrap2() GOROOT/src/runtime/mgc.go:204 +0x25 fp=0xc000130fe0 sp=0xc000130fc8 pc=0x41ea05 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000130fe8 sp=0xc000130fe0 pc=0x478c41 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:204 +0xa5 goroutine 19 gp=0xc000182700 m=nil [finalizer wait]: runtime.gopark(0xc000134660?, 0x426fdc?, 0xc0?, 0xfe?, 0x550011?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000134620 sp=0xc000134600 pc=0x4405ee runtime.runfinq() GOROOT/src/runtime/mfinal.go:194 +0x107 fp=0xc0001347e0 sp=0xc000134620 pc=0x41da27 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001347e8 sp=0xc0001347e0 pc=0x478c41 created by runtime.createfing in goroutine 1 GOROOT/src/runtime/mfinal.go:164 +0x3d goroutine 20 gp=0xc000246380 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000131750 sp=0xc000131730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001317e0 sp=0xc000131750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001317e8 sp=0xc0001317e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 3 gp=0xc000006fc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000135750 sp=0xc000135730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001357e0 sp=0xc000135750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001357e8 sp=0xc0001357e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 33 gp=0xc000480000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000486750 sp=0xc000486730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004867e0 sp=0xc000486750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004867e8 sp=0xc0004867e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 21 gp=0xc000246540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000131f50 sp=0xc000131f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000131fe0 sp=0xc000131f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000131fe8 sp=0xc000131fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 49 gp=0xc000500000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000482750 sp=0xc000482730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004827e0 sp=0xc000482750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004827e8 sp=0xc0004827e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 65 gp=0xc000464380 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047c750 sp=0xc00047c730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047c7e0 sp=0xc00047c750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047c7e8 sp=0xc00047c7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 22 gp=0xc000246700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000132750 sp=0xc000132730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001327e0 sp=0xc000132750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001327e8 sp=0xc0001327e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 50 gp=0xc0005001c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000482f50 sp=0xc000482f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000482fe0 sp=0xc000482f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000482fe8 sp=0xc000482fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 34 gp=0xc0004801c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000486f50 sp=0xc000486f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000486fe0 sp=0xc000486f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000486fe8 sp=0xc000486fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 81 gp=0xc000580000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000478750 sp=0xc000478730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004787e0 sp=0xc000478750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004787e8 sp=0xc0004787e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 4 gp=0xc000007500 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000135f50 sp=0xc000135f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000135fe0 sp=0xc000135f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000135fe8 sp=0xc000135fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 82 gp=0xc000580540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000478f50 sp=0xc000478f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000478fe0 sp=0xc000478f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000478fe8 sp=0xc000478fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 83 gp=0xc000580700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000479750 sp=0xc000479730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004797e0 sp=0xc000479750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004797e8 sp=0xc0004797e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 84 gp=0xc0005808c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000479f50 sp=0xc000479f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000479fe0 sp=0xc000479f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000479fe8 sp=0xc000479fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 85 gp=0xc000580a80 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047a750 sp=0xc00047a730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047a7e0 sp=0xc00047a750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047a7e8 sp=0xc00047a7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 5 gp=0xc0000076c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000136750 sp=0xc000136730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001367e0 sp=0xc000136750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001367e8 sp=0xc0001367e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 66 gp=0xc000464540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047cf50 sp=0xc00047cf30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047cfe0 sp=0xc00047cf50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047cfe8 sp=0xc00047cfe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 67 gp=0xc000464700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047d750 sp=0xc00047d730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047d7e0 sp=0xc00047d750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047d7e8 sp=0xc00047d7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 86 gp=0xc000580c40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047af50 sp=0xc00047af30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047afe0 sp=0xc00047af50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047afe8 sp=0xc00047afe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 6 gp=0xc000007880 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000136f50 sp=0xc000136f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000136fe0 sp=0xc000136f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000136fe8 sp=0xc000136fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 68 gp=0xc0004648c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047df50 sp=0xc00047df30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047dfe0 sp=0xc00047df50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047dfe8 sp=0xc00047dfe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 87 gp=0xc000580e00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047b750 sp=0xc00047b730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047b7e0 sp=0xc00047b750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047b7e8 sp=0xc00047b7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 69 gp=0xc000464a80 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047e750 sp=0xc00047e730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047e7e0 sp=0xc00047e750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047e7e8 sp=0xc00047e7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 70 gp=0xc000464c40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047ef50 sp=0xc00047ef30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047efe0 sp=0xc00047ef50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047efe8 sp=0xc00047efe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 88 gp=0xc000580fc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047bf50 sp=0xc00047bf30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047bfe0 sp=0xc00047bf50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047bfe8 sp=0xc00047bfe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 7 gp=0xc000007a40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000137750 sp=0xc000137730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001377e0 sp=0xc000137750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001377e8 sp=0xc0001377e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 8 gp=0xc000007c00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000137f50 sp=0xc000137f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000137fe0 sp=0xc000137f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000137fe8 sp=0xc000137fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 89 gp=0xc000581180 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000594750 sp=0xc000594730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005947e0 sp=0xc000594750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005947e8 sp=0xc0005947e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 71 gp=0xc000464e00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047f750 sp=0xc00047f730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047f7e0 sp=0xc00047f750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047f7e8 sp=0xc00047f7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 72 gp=0xc000464fc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00047ff50 sp=0xc00047ff30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00047ffe0 sp=0xc00047ff50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00047ffe8 sp=0xc00047ffe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 73 gp=0xc000465180 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000590750 sp=0xc000590730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005907e0 sp=0xc000590750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005907e8 sp=0xc0005907e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 9 gp=0xc000007dc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000168750 sp=0xc000168730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001687e0 sp=0xc000168750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001687e8 sp=0xc0001687e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 10 gp=0xc00016c000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000168f50 sp=0xc000168f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000168fe0 sp=0xc000168f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000168fe8 sp=0xc000168fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 90 gp=0xc000581340 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000594f50 sp=0xc000594f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000594fe0 sp=0xc000594f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000594fe8 sp=0xc000594fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 74 gp=0xc000465340 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000590f50 sp=0xc000590f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000590fe0 sp=0xc000590f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000590fe8 sp=0xc000590fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 91 gp=0xc000581500 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000595750 sp=0xc000595730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005957e0 sp=0xc000595750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005957e8 sp=0xc0005957e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 92 gp=0xc0005816c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000595f50 sp=0xc000595f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000595fe0 sp=0xc000595f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000595fe8 sp=0xc000595fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 11 gp=0xc00016c1c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000169750 sp=0xc000169730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001697e0 sp=0xc000169750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001697e8 sp=0xc0001697e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 12 gp=0xc00016c380 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000169f50 sp=0xc000169f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000169fe0 sp=0xc000169f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000169fe8 sp=0xc000169fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 75 gp=0xc000465500 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000591750 sp=0xc000591730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005917e0 sp=0xc000591750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005917e8 sp=0xc0005917e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 93 gp=0xc000581880 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000596750 sp=0xc000596730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005967e0 sp=0xc000596750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005967e8 sp=0xc0005967e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 13 gp=0xc00016c540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00016a750 sp=0xc00016a730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00016a7e0 sp=0xc00016a750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00016a7e8 sp=0xc00016a7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 76 gp=0xc0004656c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000591f50 sp=0xc000591f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000591fe0 sp=0xc000591f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000591fe8 sp=0xc000591fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 94 gp=0xc000581a40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000596f50 sp=0xc000596f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000596fe0 sp=0xc000596f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000596fe8 sp=0xc000596fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 77 gp=0xc000465880 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000592750 sp=0xc000592730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005927e0 sp=0xc000592750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005927e8 sp=0xc0005927e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 78 gp=0xc000465a40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000592f50 sp=0xc000592f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000592fe0 sp=0xc000592f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000592fe8 sp=0xc000592fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 95 gp=0xc000581c00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000597750 sp=0xc000597730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005977e0 sp=0xc000597750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005977e8 sp=0xc0005977e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 79 gp=0xc000465c00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000593750 sp=0xc000593730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0005937e0 sp=0xc000593750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005937e8 sp=0xc0005937e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 14 gp=0xc00016c700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00016af50 sp=0xc00016af30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00016afe0 sp=0xc00016af50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00016afe8 sp=0xc00016afe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 96 gp=0xc000581dc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000597f50 sp=0xc000597f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000597fe0 sp=0xc000597f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000597fe8 sp=0xc000597fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 80 gp=0xc000465dc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000593f50 sp=0xc000593f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000593fe0 sp=0xc000593f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000593fe8 sp=0xc000593fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 15 gp=0xc00016c8c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00016b750 sp=0xc00016b730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00016b7e0 sp=0xc00016b750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00016b7e8 sp=0xc00016b7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 97 gp=0xc00059a000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000164750 sp=0xc000164730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001647e0 sp=0xc000164750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001647e8 sp=0xc0001647e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 113 gp=0xc000600000 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000606750 sp=0xc000606730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006067e0 sp=0xc000606750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006067e8 sp=0xc0006067e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 98 gp=0xc00059a1c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000164f50 sp=0xc000164f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000164fe0 sp=0xc000164f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000164fe8 sp=0xc000164fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 114 gp=0xc0006001c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000606f50 sp=0xc000606f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000606fe0 sp=0xc000606f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000606fe8 sp=0xc000606fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 16 gp=0xc00016ca80 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00016bf50 sp=0xc00016bf30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00016bfe0 sp=0xc00016bf50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00016bfe8 sp=0xc00016bfe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 99 gp=0xc00059a380 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000165750 sp=0xc000165730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001657e0 sp=0xc000165750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001657e8 sp=0xc0001657e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 23 gp=0xc0002468c0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000132f50 sp=0xc000132f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000132fe0 sp=0xc000132f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000132fe8 sp=0xc000132fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 100 gp=0xc00059a540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000165f50 sp=0xc000165f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000165fe0 sp=0xc000165f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000165fe8 sp=0xc000165fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 101 gp=0xc00059a700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000166750 sp=0xc000166730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001667e0 sp=0xc000166750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001667e8 sp=0xc0001667e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 129 gp=0xc00016cc40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000602750 sp=0xc000602730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006027e0 sp=0xc000602750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006027e8 sp=0xc0006027e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 115 gp=0xc000600380 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000607750 sp=0xc000607730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006077e0 sp=0xc000607750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006077e8 sp=0xc0006077e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 116 gp=0xc000600540 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000607f50 sp=0xc000607f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000607fe0 sp=0xc000607f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000607fe8 sp=0xc000607fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 130 gp=0xc00016ce00 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000602f50 sp=0xc000602f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000602fe0 sp=0xc000602f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000602fe8 sp=0xc000602fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 117 gp=0xc000600700 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000608750 sp=0xc000608730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006087e0 sp=0xc000608750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006087e8 sp=0xc0006087e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 131 gp=0xc00016cfc0 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000603750 sp=0xc000603730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006037e0 sp=0xc000603750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006037e8 sp=0xc0006037e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 24 gp=0xc000246a80 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000133750 sp=0xc000133730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001337e0 sp=0xc000133750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001337e8 sp=0xc0001337e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 25 gp=0xc000246c40 m=nil [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000133f50 sp=0xc000133f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000133fe0 sp=0xc000133f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000133fe8 sp=0xc000133fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 26 gp=0xc000246e00 m=nil [GC worker (idle)]: runtime.gopark(0x4c645455f046a8?, 0x1?, 0x6a?, 0x26?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000684750 sp=0xc000684730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006847e0 sp=0xc000684750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006847e8 sp=0xc0006847e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 132 gp=0xc00016d180 m=nil [GC worker (idle)]: runtime.gopark(0x4c645455f202f4?, 0x1?, 0x7a?, 0x9c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000603f50 sp=0xc000603f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000603fe0 sp=0xc000603f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000603fe8 sp=0xc000603fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 27 gp=0xc000246fc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c645455f01c28?, 0x1?, 0x6c?, 0xce?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000684f50 sp=0xc000684f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000684fe0 sp=0xc000684f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000684fe8 sp=0xc000684fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 118 gp=0xc0006008c0 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0x70?, 0xb2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000608f50 sp=0xc000608f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000608fe0 sp=0xc000608f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000608fe8 sp=0xc000608fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 133 gp=0xc00016d340 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0x90?, 0x63?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000604750 sp=0xc000604730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006047e0 sp=0xc000604750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006047e8 sp=0xc0006047e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 28 gp=0xc000247180 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0xfc?, 0xd0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000685750 sp=0xc000685730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006857e0 sp=0xc000685750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006857e8 sp=0xc0006857e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 134 gp=0xc00016d500 m=nil [GC worker (idle)]: runtime.gopark(0x4c645bdc09023f?, 0x1?, 0xa0?, 0x21?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000604f50 sp=0xc000604f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000604fe0 sp=0xc000604f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000604fe8 sp=0xc000604fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 119 gp=0xc000600a80 m=nil [GC worker (idle)]: runtime.gopark(0x4c645dda9f144d?, 0x1?, 0x86?, 0xa0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000609750 sp=0xc000609730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006097e0 sp=0xc000609750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006097e8 sp=0xc0006097e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 135 gp=0xc00016d6c0 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0xa4?, 0x3d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000605750 sp=0xc000605730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006057e0 sp=0xc000605750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006057e8 sp=0xc0006057e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 136 gp=0xc00016d880 m=nil [GC worker (idle)]: runtime.gopark(0x4c645ddaa8e905?, 0x1?, 0xb0?, 0x8c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000605f50 sp=0xc000605f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000605fe0 sp=0xc000605f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000605fe8 sp=0xc000605fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 29 gp=0xc000247340 m=nil [GC worker (idle)]: runtime.gopark(0x4c645dda9f3cb1?, 0x1?, 0x6e?, 0xbd?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000685f50 sp=0xc000685f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000685fe0 sp=0xc000685f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000685fe8 sp=0xc000685fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 120 gp=0xc000600c40 m=nil [GC worker (idle)]: runtime.gopark(0x4c645bdc08bc3f?, 0x1?, 0xd0?, 0x44?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000609f50 sp=0xc000609f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000609fe0 sp=0xc000609f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000609fe8 sp=0xc000609fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 137 gp=0xc00016da40 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0xfe?, 0x1a?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000680750 sp=0xc000680730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006807e0 sp=0xc000680750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006807e8 sp=0xc0006807e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 30 gp=0xc000247500 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0xa4?, 0xd9?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000686750 sp=0xc000686730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006867e0 sp=0xc000686750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006867e8 sp=0xc0006867e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 121 gp=0xc000600e00 m=nil [GC worker (idle)]: runtime.gopark(0x4c645bdc092783?, 0x1?, 0xb0?, 0x39?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060e750 sp=0xc00060e730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060e7e0 sp=0xc00060e750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060e7e8 sp=0xc00060e7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 138 gp=0xc00016dc00 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x3?, 0x4a?, 0xc0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000680f50 sp=0xc000680f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000680fe0 sp=0xc000680f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000680fe8 sp=0xc000680fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 31 gp=0xc0002476c0 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0x93?, 0xf2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000686f50 sp=0xc000686f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000686fe0 sp=0xc000686f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000686fe8 sp=0xc000686fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 122 gp=0xc000600fc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c645dda9ee0db?, 0x1?, 0x5c?, 0x1a?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060ef50 sp=0xc00060ef30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060efe0 sp=0xc00060ef50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060efe8 sp=0xc00060efe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 139 gp=0xc00016ddc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c645dda9c5041?, 0x1?, 0x4a?, 0x55?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000681750 sp=0xc000681730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006817e0 sp=0xc000681750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006817e8 sp=0xc0006817e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 123 gp=0xc000601180 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0x38?, 0x1d?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060f750 sp=0xc00060f730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060f7e0 sp=0xc00060f750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060f7e8 sp=0xc00060f7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 102 gp=0xc00059a8c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c645ddaa8e86f?, 0x1?, 0x5c?, 0xb7?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000166f50 sp=0xc000166f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000166fe0 sp=0xc000166f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000166fe8 sp=0xc000166fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 140 gp=0xc00016e000 m=nil [GC worker (idle)]: runtime.gopark(0x4c645ddaa8e923?, 0x1?, 0xd6?, 0x5a?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000681f50 sp=0xc000681f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000681fe0 sp=0xc000681f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000681fe8 sp=0xc000681fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 32 gp=0xc000247880 m=nil [GC worker (idle)]: runtime.gopark(0x4c64545581ba8a?, 0x1?, 0xe?, 0x43?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000687750 sp=0xc000687730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006877e0 sp=0xc000687750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006877e8 sp=0xc0006877e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 145 gp=0xc000247a40 m=nil [GC worker (idle)]: runtime.gopark(0x4c645bdc0928c3?, 0x1?, 0xca?, 0x9f?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000687f50 sp=0xc000687f30 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000687fe0 sp=0xc000687f50 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000687fe8 sp=0xc000687fe0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 146 gp=0xc000247c00 m=nil [GC worker (idle)]: runtime.gopark(0x4c645ddaa950bb?, 0x3?, 0x9c?, 0x90?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060a750 sp=0xc00060a730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060a7e0 sp=0xc00060a750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060a7e8 sp=0xc00060a7e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 103 gp=0xc00059aa80 m=nil [GC worker (idle)]: runtime.gopark(0x1fcfec0?, 0x1?, 0xb4?, 0x91?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000167750 sp=0xc000167730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001677e0 sp=0xc000167750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001677e8 sp=0xc0001677e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 141 gp=0xc00016e1c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c645ddaa84c1b?, 0x1?, 0x46?, 0xf6?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000682750 sp=0xc000682730 pc=0x4405ee runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0006827e0 sp=0xc000682750 pc=0x420b45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006827e8 sp=0xc0006827e0 pc=0x478c41 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 147 gp=0xc00016e700 m=nil [sync.Cond.Wait]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00017cd60 sp=0xc00017cd40 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000462ed8, 0x0) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00017cdb0 sp=0xc00017cd60 pc=0x474979 sync.(*Cond).Wait(0xc000462808?) GOROOT/src/sync/cond.go:70 +0x85 fp=0xc00017cdf0 sp=0xc00017cdb0 pc=0x482b05 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000462808) pkg/sentry/pgalloc/pgalloc.go:1442 +0xbd fp=0xc00017ce58 sp=0xc00017cdf0 pc=0x7b5d1d gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000462808) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc00017cfc8 sp=0xc00017ce58 pc=0x7b5432 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x25 fp=0xc00017cfe0 sp=0xc00017cfc8 pc=0x7b0ae5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00017cfe8 sp=0xc00017cfe0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x29b goroutine 148 gp=0xc00016ee00 m=nil [chan receive]: runtime.gopark(0xc000a83080?, 0xc0006511a0?, 0x0?, 0x0?, 0xc000178f50?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000178ef8 sp=0xc000178ed8 pc=0x4405ee runtime.chanrecv(0xc00019e480, 0xc000178fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x3bf fp=0xc000178f70 sp=0xc000178ef8 pc=0x40a83f runtime.chanrecv2(0xc00016e8c0?, 0x1118fc0?) GOROOT/src/runtime/chan.go:447 +0x12 fp=0xc000178f98 sp=0xc000178f70 pc=0x40a472 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:336 +0x54 fp=0xc000178fe0 sp=0xc000178f98 pc=0xd24cb4 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000178fe8 sp=0xc000178fe0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess in goroutine 1 pkg/sentry/platform/systrap/subprocess.go:333 +0x265 goroutine 149 gp=0xc00016efc0 m=nil [sleep]: runtime.gopark(0x4c645e06640b7e?, 0xc0004837b8?, 0xd?, 0x20?, 0xd20fde?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000483788 sp=0xc000483768 pc=0x4405ee time.Sleep(0x61a80) GOROOT/src/runtime/time.go:195 +0x115 fp=0xc0004837c8 sp=0xc000483788 pc=0x475635 gvisor.dev/gvisor/pkg/sentry/platform/systrap.controlFastPath() pkg/sentry/platform/systrap/metrics.go:263 +0x18 fp=0xc0004837e0 sp=0xc0004837c8 pc=0xd20a78 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004837e8 sp=0xc0004837e0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.New.func2 in goroutine 1 pkg/sentry/platform/systrap/systrap.go:346 +0x1a goroutine 150 gp=0xc00016f180 m=nil [sync.Cond.Wait]: runtime.gopark(0x25450000?, 0x2535f000?, 0x38?, 0x38?, 0x7b6440?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000998d60 sp=0xc000998d40 pc=0x4405ee runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000463ed8, 0xe98) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc000998db0 sp=0xc000998d60 pc=0x474979 sync.(*Cond).Wait(0xc000463808?) GOROOT/src/sync/cond.go:70 +0x85 fp=0xc000998df0 sp=0xc000998db0 pc=0x482b05 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000463808) pkg/sentry/pgalloc/pgalloc.go:1442 +0xbd fp=0xc000998e58 sp=0xc000998df0 pc=0x7b5d1d gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000463808) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc000998fc8 sp=0xc000998e58 pc=0x7b5432 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x25 fp=0xc000998fe0 sp=0xc000998fc8 pc=0x7b0ae5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000998fe8 sp=0xc000998fe0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x29b goroutine 151 gp=0xc00016f340 m=nil [select]: runtime.gopark(0xc0006a2f98?, 0x2?, 0xd2?, 0x4a?, 0xc0006a2f64?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0006a2e00 sp=0xc0006a2de0 pc=0x4405ee runtime.selectgo(0xc0006a2f98, 0xc0006a2f60, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x725 fp=0xc0006a2f20 sp=0xc0006a2e00 pc=0x4526a5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x171 fp=0xc0006a2fe0 sp=0xc0006a2f20 pc=0x9cd791 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0006a2fe8 sp=0xc0006a2fe0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater in goroutine 1 pkg/sentry/kernel/timekeeper.go:224 +0xd3 goroutine 124 gp=0xc000480380 m=nil [select]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004846b0 sp=0xc000484690 pc=0x4405ee gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:33 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006d4020, 0x1, 0x70?) pkg/sleep/sleep_unsafe.go:210 +0x79 fp=0xc0004846f0 sp=0xc0004846b0 pc=0xa2af59 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006d4020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x2b fp=0xc000484718 sp=0xc0004846f0 pc=0xa2b04b gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006d4008, 0xc0004847b8?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xb5 fp=0xc0004847c0 sp=0xc000484718 pc=0xa493b5 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x25 fp=0xc0004847e0 sp=0xc0004847c0 pc=0xa49ae5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004847e8 sp=0xc0004847e0 pc=0x478c41 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x13b goroutine 125 gp=0xc000480540 m=nil [select]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060ceb0 sp=0xc00060ce90 pc=0x4405ee gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:33 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006d40b0, 0x1, 0x0?) D0318 17:09:41.261063 1 connection.go:127] sock read failed, closing connection: EOF W0318 17:09:41.261145 434955 sandbox.go:1144] Wait RPC to container "ci-gvisor-systrap-1-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0318 17:09:41.261175 1 gofer.go:341] All lisafs servers exited. I0318 17:09:41.261224 1 main.go:226] Exiting with status: 0 D0318 17:09:41.262991 434955 container.go:795] Destroy container, cid: ci-gvisor-systrap-1-1 D0318 17:09:41.263124 434955 container.go:1092] Destroying container, cid: ci-gvisor-systrap-1-1 D0318 17:09:41.263140 434955 sandbox.go:1437] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-1 D0318 17:09:41.263187 434955 sandbox.go:1186] Destroying sandbox "ci-gvisor-systrap-1-1" D0318 17:09:41.263293 434955 container.go:1106] Killing gofer for container, cid: ci-gvisor-systrap-1-1, PID: 434966 D0318 17:09:41.266405 434955 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-1" D0318 17:09:41.266449 434955 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-1" D0318 17:09:41.266564 434955 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-1" D0318 17:09:41.266593 434955 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-1" D0318 17:09:41.266603 434955 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-1" D0318 17:09:41.266613 434955 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-1" D0318 17:09:41.266623 434955 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-1" D0318 17:09:41.266633 434955 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-1" D0318 17:09:41.266642 434955 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-1" D0318 17:09:41.266665 434955 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-1" D0318 17:09:41.267119 434955 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-1" I0318 17:09:41.267352 434955 main.go:226] Exiting with status: 512 VM DIAGNOSIS: I0318 17:09:41.216191 436011 main.go:194] **************** gVisor **************** I0318 17:09:41.216269 436011 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 436011, PPID 971532, UID 0, GID 0 D0318 17:09:41.216279 436011 main.go:196] Page size: 0x1000 (4096 bytes) I0318 17:09:41.216285 436011 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1/current/image -root /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-1] I0318 17:09:41.216312 436011 config.go:395] Platform: systrap I0318 17:09:41.216365 436011 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root I0318 17:09:41.216369 436011 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 17:09:41.216380 436011 config.go:398] Network: sandbox I0318 17:09:41.216398 436011 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 17:09:41.216412 436011 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root D0318 17:09:41.216445 436011 config.go:418] Config.Traceback (--traceback): system D0318 17:09:41.216456 436011 config.go:418] Config.Debug (--debug): true D0318 17:09:41.216463 436011 config.go:418] Config.LogFilename (--log): (empty) D0318 17:09:41.216468 436011 config.go:418] Config.LogFormat (--log-format): text D0318 17:09:41.216474 436011 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 17:09:41.216480 436011 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 17:09:41.216485 436011 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 17:09:41.216490 436011 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 17:09:41.216495 436011 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 17:09:41.216498 436011 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 17:09:41.216502 436011 config.go:418] Config.FileAccess (--file-access): shared D0318 17:09:41.216506 436011 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 17:09:41.216510 436011 config.go:418] Config.Overlay (--overlay): false D0318 17:09:41.216514 436011 config.go:418] Config.Overlay2 (--overlay2): none D0318 17:09:41.216518 436011 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 17:09:41.216521 436011 config.go:418] Config.HostUDS (--host-uds): none D0318 17:09:41.216526 436011 config.go:418] Config.HostFifo (--host-fifo): none D0318 17:09:41.216530 436011 config.go:418] Config.Network (--network): sandbox D0318 17:09:41.216535 436011 config.go:418] Config.EnableRaw (--net-raw): true D0318 17:09:41.216538 436011 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 17:09:41.216541 436011 config.go:418] Config.HostGSO (--gso): false D0318 17:09:41.216553 436011 config.go:418] Config.GvisorGSO (--software-gso): true D0318 17:09:41.216591 436011 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 17:09:41.216600 436011 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 17:09:41.216604 436011 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 17:09:41.216609 436011 config.go:418] Config.QDisc (--qdisc): fifo D0318 17:09:41.216616 436011 config.go:418] Config.LogPackets (--log-packets): false D0318 17:09:41.216651 436011 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 17:09:41.216657 436011 config.go:418] Config.Platform (--platform): systrap D0318 17:09:41.216663 436011 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 17:09:41.216667 436011 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 17:09:41.216671 436011 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 17:09:41.216674 436011 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 17:09:41.216679 436011 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 17:09:41.216684 436011 config.go:418] Config.Strace (--strace): false D0318 17:09:41.216688 436011 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 17:09:41.216697 436011 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 17:09:41.216703 436011 config.go:418] Config.StraceEvent (--strace-event): false D0318 17:09:41.216708 436011 config.go:420] Config.DisableSeccomp: false D0318 17:09:41.216716 436011 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 17:09:41.216722 436011 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 17:09:41.216746 436011 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 17:09:41.216752 436011 config.go:418] Config.ProfileEnable (--profile): false D0318 17:09:41.216759 436011 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 17:09:41.216775 436011 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 17:09:41.216780 436011 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 17:09:41.216786 436011 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 17:09:41.216801 436011 config.go:418] Config.TraceFile (--trace): (empty) D0318 17:09:41.216805 436011 config.go:420] Config.RestoreFile: (empty) D0318 17:09:41.216812 436011 config.go:418] Config.NumNetworkChannels (--num-network-channels): 1 D0318 17:09:41.216819 436011 config.go:418] Config.Rootless (--rootless): false D0318 17:09:41.216827 436011 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 17:09:41.216844 436011 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 17:09:41.216855 436011 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 17:09:41.216871 436011 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 17:09:41.216877 436011 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 17:09:41.216883 436011 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 17:09:41.216897 436011 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 17:09:41.216901 436011 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 17:09:41.216906 436011 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 17:09:41.216911 436011 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 17:09:41.216932 436011 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 17:09:41.216937 436011 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 17:09:41.216982 436011 config.go:418] Config.DCache (--dcache): -1 D0318 17:09:41.217008 436011 config.go:418] Config.IOUring (--iouring): false D0318 17:09:41.217018 436011 config.go:418] Config.DirectFS (--directfs): true D0318 17:09:41.217023 436011 config.go:418] Config.NVProxy (--nvproxy): false D0318 17:09:41.217028 436011 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 17:09:41.217034 436011 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 17:09:41.217039 436011 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): false D0318 17:09:41.217044 436011 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 17:09:41.217069 436011 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 17:09:41.217076 436011 config.go:420] Config.explicitlySet: (unexported) D0318 17:09:41.217083 436011 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 17:09:41.217094 436011 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 17:09:41.217115 436011 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 17:09:41.217120 436011 main.go:199] **************** gVisor **************** D0318 17:09:41.217189 436011 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 17:09:41.218701 436011 util.go:51] Found sandbox "ci-gvisor-systrap-1-1", PID: 434971 Found sandbox "ci-gvisor-systrap-1-1", PID: 434971 I0318 17:09:41.218766 436011 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 17:09:41.218774 436011 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-1" D0318 17:09:41.218809 436011 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-1" W0318 17:09:41.218890 436011 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 434971: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 434971: connection refused W0318 17:09:41.218970 436011 main.go:235] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-1"]: exit status 128 I0318 17:09:41.216191 436011 main.go:194] **************** gVisor **************** I0318 17:09:41.216269 436011 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 436011, PPID 971532, UID 0, GID 0 D0318 17:09:41.216279 436011 main.go:196] Page size: 0x1000 (4096 bytes) I0318 17:09:41.216285 436011 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1/current/image -root /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-1] I0318 17:09:41.216312 436011 config.go:395] Platform: systrap I0318 17:09:41.216365 436011 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root I0318 17:09:41.216369 436011 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 17:09:41.216380 436011 config.go:398] Network: sandbox I0318 17:09:41.216398 436011 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 17:09:41.216412 436011 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root D0318 17:09:41.216445 436011 config.go:418] Config.Traceback (--traceback): system D0318 17:09:41.216456 436011 config.go:418] Config.Debug (--debug): true D0318 17:09:41.216463 436011 config.go:418] Config.LogFilename (--log): (empty) D0318 17:09:41.216468 436011 config.go:418] Config.LogFormat (--log-format): text D0318 17:09:41.216474 436011 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 17:09:41.216480 436011 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 17:09:41.216485 436011 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 17:09:41.216490 436011 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 17:09:41.216495 436011 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 17:09:41.216498 436011 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 17:09:41.216502 436011 config.go:418] Config.FileAccess (--file-access): shared D0318 17:09:41.216506 436011 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 17:09:41.216510 436011 config.go:418] Config.Overlay (--overlay): false D0318 17:09:41.216514 436011 config.go:418] Config.Overlay2 (--overlay2): none D0318 17:09:41.216518 436011 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 17:09:41.216521 436011 config.go:418] Config.HostUDS (--host-uds): none D0318 17:09:41.216526 436011 config.go:418] Config.HostFifo (--host-fifo): none D0318 17:09:41.216530 436011 config.go:418] Config.Network (--network): sandbox D0318 17:09:41.216535 436011 config.go:418] Config.EnableRaw (--net-raw): true D0318 17:09:41.216538 436011 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 17:09:41.216541 436011 config.go:418] Config.HostGSO (--gso): false D0318 17:09:41.216553 436011 config.go:418] Config.GvisorGSO (--software-gso): true D0318 17:09:41.216591 436011 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 17:09:41.216600 436011 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 17:09:41.216604 436011 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 17:09:41.216609 436011 config.go:418] Config.QDisc (--qdisc): fifo D0318 17:09:41.216616 436011 config.go:418] Config.LogPackets (--log-packets): false D0318 17:09:41.216651 436011 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 17:09:41.216657 436011 config.go:418] Config.Platform (--platform): systrap D0318 17:09:41.216663 436011 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 17:09:41.216667 436011 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 17:09:41.216671 436011 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 17:09:41.216674 436011 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 17:09:41.216679 436011 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 17:09:41.216684 436011 config.go:418] Config.Strace (--strace): false D0318 17:09:41.216688 436011 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 17:09:41.216697 436011 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 17:09:41.216703 436011 config.go:418] Config.StraceEvent (--strace-event): false D0318 17:09:41.216708 436011 config.go:420] Config.DisableSeccomp: false D0318 17:09:41.216716 436011 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 17:09:41.216722 436011 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 17:09:41.216746 436011 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 17:09:41.216752 436011 config.go:418] Config.ProfileEnable (--profile): false D0318 17:09:41.216759 436011 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 17:09:41.216775 436011 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 17:09:41.216780 436011 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 17:09:41.216786 436011 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 17:09:41.216801 436011 config.go:418] Config.TraceFile (--trace): (empty) D0318 17:09:41.216805 436011 config.go:420] Config.RestoreFile: (empty) D0318 17:09:41.216812 436011 config.go:418] Config.NumNetworkChannels (--num-network-channels): 1 D0318 17:09:41.216819 436011 config.go:418] Config.Rootless (--rootless): false D0318 17:09:41.216827 436011 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 17:09:41.216844 436011 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 17:09:41.216855 436011 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 17:09:41.216871 436011 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 17:09:41.216877 436011 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 17:09:41.216883 436011 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 17:09:41.216897 436011 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 17:09:41.216901 436011 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 17:09:41.216906 436011 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 17:09:41.216911 436011 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 17:09:41.216932 436011 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 17:09:41.216937 436011 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 17:09:41.216982 436011 config.go:418] Config.DCache (--dcache): -1 D0318 17:09:41.217008 436011 config.go:418] Config.IOUring (--iouring): false D0318 17:09:41.217018 436011 config.go:418] Config.DirectFS (--directfs): true D0318 17:09:41.217023 436011 config.go:418] Config.NVProxy (--nvproxy): false D0318 17:09:41.217028 436011 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 17:09:41.217034 436011 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 17:09:41.217039 436011 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): false D0318 17:09:41.217044 436011 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 17:09:41.217069 436011 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 17:09:41.217076 436011 config.go:420] Config.explicitlySet: (unexported) D0318 17:09:41.217083 436011 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 17:09:41.217094 436011 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 17:09:41.217115 436011 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 17:09:41.217120 436011 main.go:199] **************** gVisor **************** D0318 17:09:41.217189 436011 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 17:09:41.218701 436011 util.go:51] Found sandbox "ci-gvisor-systrap-1-1", PID: 434971 Found sandbox "ci-gvisor-systrap-1-1", PID: 434971 I0318 17:09:41.218766 436011 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 17:09:41.218774 436011 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-1" D0318 17:09:41.218809 436011 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-1" W0318 17:09:41.218890 436011 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 434971: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-1" stacks: connecting to control server at PID 434971: connection refused W0318 17:09:41.218970 436011 main.go:235] Failure to execute command, err: 1 [21399023.539016] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d070 di:ffffffffff600000 [21399024.064283] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399032.398231] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399038.736236] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399040.711896] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.141077] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.320658] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.365757] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.528291] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399054.209238] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399057.839233] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.242500] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399059.305399] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.835945] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399060.302776] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399062.273940] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399062.412432] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.348920] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.836985] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399068.992600] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399069.248037] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399077.389152] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399086.551390] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399087.302079] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399089.269778] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399090.747161] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399093.678934] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399104.558244] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399105.486050] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399107.430062] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399110.506404] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399130.767649] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399134.325405] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399134.630746] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399136.972718] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399137.143270] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399139.500776] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.308162] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.436491] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399149.607720] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399151.351347] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399153.803069] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399154.225697] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.047011] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.833942] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399165.845832] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399173.464281] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399177.155108] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399180.613675] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399186.980096] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399189.987004] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399190.754030] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399191.095139] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399192.116478] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399196.294677] potentially unexpected fatal signal 5. [21399196.299912] CPU: 28 PID: 885408 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399196.311911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399196.321541] RIP: 0033:0x7fffffffe062 [21399196.325616] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399196.345046] RSP: 002b:000000c00079fb90 EFLAGS: 00000297 [21399196.350665] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399196.358215] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399196.365800] RBP: 000000c00079fc28 R08: 0000000000000000 R09: 0000000000000000 [21399196.374738] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00079fc18 [21399196.383691] R13: 000000c0006b5f20 R14: 000000c000183dc0 R15: 00000000000d5f38 [21399196.392621] FS: 000000c00013b098 GS: 0000000000000000 [21399200.924914] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399201.041167] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399203.423036] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399212.866385] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399217.630931] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399218.390790] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.650383] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.915711] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399221.518377] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399223.339394] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.488421] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f456858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.998793] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399227.546945] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2097 di:ffffffffff600000 [21399229.460700] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399234.888808] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399236.072167] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399240.012586] exe[956779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9966f4ab9 cs:33 sp:7ea3b8555858 ax:0 si:55c99674e062 di:ffffffffff600000 [21399240.663828] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399249.645510] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399253.931457] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399254.731181] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399260.717195] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399261.115293] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399268.721351] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399270.122457] potentially unexpected fatal signal 11. [21399270.127758] CPU: 26 PID: 951648 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399270.139748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399270.149372] RIP: 0033:0x5557bcd52a80 [21399270.153350] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21399270.172558] RSP: 002b:00007f8d9e0d4440 EFLAGS: 00010246 [21399270.178223] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005557bcd52e0d [21399270.185811] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00005557bd9b4760 [21399270.194743] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21399270.203702] R10: 00005557bd9b4750 R11: 0000000000000246 R12: 0000000000000000 [21399270.212626] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21399270.221553] FS: 00005557bd9b4480 GS: 0000000000000000 [21399276.420819] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399278.667253] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.685345] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.851553] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399280.137711] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.695975] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.940461] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.616527] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.667318] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399302.127576] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399302.964924] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399306.096773] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399307.520031] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399308.341015] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399317.260377] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399319.791665] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399321.164678] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399322.882547] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399323.140915] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3070 di:ffffffffff600000 [21399323.875742] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399324.072451] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399325.346682] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399329.463261] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399335.923837] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399336.311887] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebdb858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399344.961236] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399347.269115] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399349.967714] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399355.310746] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399370.633200] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399372.575499] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399393.829970] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399394.009671] exe[905356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399395.887831] exe[928043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399410.451276] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399417.878270] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399418.189927] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399428.562115] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399431.170662] exe[915411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399431.903956] exe[905597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399435.570559] exe[905565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399445.928136] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399447.329820] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399457.831724] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399460.681308] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399465.454483] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399471.470256] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399471.957576] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399481.118974] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399482.331198] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399484.263582] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399488.709041] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d097 di:ffffffffff600000 [21399491.094927] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399494.307349] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399495.569879] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399501.295848] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399508.951979] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399511.721391] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399517.796815] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399519.663252] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d070 di:ffffffffff600000 [21399524.464590] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399525.817562] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399531.992311] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399534.946173] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399535.794097] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399538.995823] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399541.298332] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399542.939719] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399543.525277] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.064117] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.611028] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399549.323477] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399552.156071] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399559.043889] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399569.932242] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399580.245121] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399582.416356] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba097 di:ffffffffff600000 [21399582.692839] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399585.863069] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399595.342932] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399601.139307] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399603.729357] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399611.049638] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399613.219724] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399616.521352] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399625.870233] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399627.339355] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399628.622866] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399629.820018] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399630.096202] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399633.755013] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399638.321565] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399639.606616] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399642.078994] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399645.440263] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399648.464012] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399653.127322] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399661.414583] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399665.892639] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399667.731240] potentially unexpected fatal signal 5. [21399667.736591] CPU: 48 PID: 943669 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399667.748584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399667.758195] RIP: 0033:0x7fffffffe062 [21399667.762158] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399667.781400] RSP: 002b:000000c0001dfb90 EFLAGS: 00000297 [21399667.787068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399667.796019] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399667.804946] RBP: 000000c0001dfc28 R08: 0000000000000000 R09: 0000000000000000 [21399667.813874] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001dfc18 [21399667.822803] R13: 000000c0001cdf20 R14: 000000c0002d2540 R15: 00000000000e602b [21399667.830365] FS: 000000c000580098 GS: 0000000000000000 [21399670.736599] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399672.299353] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b55888858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.175869] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.338143] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399680.790774] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.258589] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.695687] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399696.346278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399696.424588] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399697.722008] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399699.115785] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6097 di:ffffffffff600000 [21399700.269625] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399709.360394] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399711.609643] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399714.276681] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399717.935817] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.258943] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.913226] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399730.481543] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399731.830888] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399734.760199] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.828482] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.877164] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399738.159386] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399747.593790] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399748.864602] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399749.389031] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399755.306022] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399760.273045] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399761.678984] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399762.194726] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399769.639869] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.176304] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.568845] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399775.876698] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399780.700260] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399781.439600] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29070 di:ffffffffff600000 [21399781.574301] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399781.889933] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399784.328506] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399788.282433] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399800.444940] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399810.764150] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399810.872863] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399811.258678] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399813.396152] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399823.666158] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399824.943269] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399825.002685] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727097 di:ffffffffff600000 [21399825.785587] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399827.998037] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399831.811778] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399832.496978] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736097 di:ffffffffff600000 [21399833.890697] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399841.854827] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399842.557399] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399847.198660] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399848.680239] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399849.719862] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399850.761088] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399852.118759] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399852.869143] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399854.091810] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399855.394587] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399857.283340] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399860.654064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399867.652385] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399868.959124] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399871.210482] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399879.120138] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399882.745559] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399886.157885] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399891.386825] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399902.067359] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399912.170315] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399912.238663] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.103314] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.209832] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399929.912955] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399929.968328] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399931.265499] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399934.705360] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399935.210167] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399944.679296] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399945.836845] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399949.510426] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399949.617116] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399952.777859] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399953.117078] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.580339] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.976693] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.757684] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.846057] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399958.660140] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5097 di:ffffffffff600000 [21399961.334210] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399962.566470] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399963.181402] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399968.101729] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399969.550254] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399971.611650] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399976.495031] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399978.395878] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399980.162700] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399983.441542] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.490085] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.918294] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399992.365538] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399996.829233] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21400006.028020] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30097 di:ffffffffff600000 [21400006.386534] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400006.436553] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400010.090497] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.048368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.682588] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.049570] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.367599] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.497971] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400025.498886] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400027.014174] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.553012] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.944828] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400034.182832] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400036.973661] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400039.319684] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400107.653737] exe[959279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce0cacb237 cs:33 sp:7edbf24d5ef8 ax:2f700000 si:55ce0cb392f7 di:ffffffffff600000 [21400267.948866] potentially unexpected fatal signal 11. [21400267.954192] CPU: 82 PID: 980016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400267.966192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400267.975839] RIP: 0033:0x55fa6b33e0e9 [21400267.979819] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21400267.999085] RSP: 002b:00007f894adaf448 EFLAGS: 00010213 [21400268.004733] RAX: 0000000000000016 RBX: 000055fa6b3883b9 RCX: 000055fa6b33e0d7 [21400268.012291] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f894adb05c0 [21400268.019860] RBP: 00007f894adb059c R08: 0000000027927554 R09: 00000000000000c8 [21400268.029415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f894adb05c0 [21400268.038331] R13: 000055fa6b3883b9 R14: 0000000000018912 R15: 0000000000000002 [21400268.045910] FS: 000055fa6bf9b480 GS: 0000000000000000 [21400358.896744] exe[963136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558de269ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400359.036532] exe[961057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c262addb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400919.035079] potentially unexpected fatal signal 5. [21400919.040305] CPU: 48 PID: 995945 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400919.052327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400919.061978] RIP: 0033:0x7fffffffe062 [21400919.066018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21400919.086641] RSP: 002b:000000c0004cdb90 EFLAGS: 00000297 [21400919.093604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21400919.102531] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000555d07c00000 [21400919.111559] RBP: 000000c0004cdc28 R08: 0000000000000000 R09: 0000000000000000 [21400919.120474] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004cdc18 [21400919.129433] R13: 000000c0004f2ab0 R14: 000000c0004ada40 R15: 00000000000f2a59 [21400919.138346] FS: 000000c000180098 GS: 0000000000000000 [21401651.886459] exe[988289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e64d9ab9 cs:33 sp:7f53882d6858 ax:0 si:5589e6533062 di:ffffffffff600000 [21401950.865701] potentially unexpected fatal signal 5. [21401950.870946] CPU: 30 PID: 948115 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21401950.882962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21401950.892637] RIP: 0033:0x7fffffffe062 [21401950.896637] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21401950.917247] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [21401950.924235] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21401950.933191] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21401950.942095] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [21401950.951037] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [21401950.959929] R13: 000000c0005d3f50 R14: 000000c0001656c0 R15: 00000000000e4c60 [21401950.968874] FS: 000000c00013b098 GS: 0000000000000000 [21402267.266628] exe[928606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6abc2aab9 cs:33 sp:7f011d6f7ef8 ax:0 si:20000100 di:ffffffffff600000 [21402894.686778] exe[30428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b014ec1ab9 cs:33 sp:7fabd77fe858 ax:0 si:55b014f1b062 di:ffffffffff600000 [21402979.388559] exe[30319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e4e10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80800000 [21403385.838442] exe[40126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc43c9ab9 cs:33 sp:7f88a3b75858 ax:0 si:560fc4423062 di:ffffffffff600000 [21404179.602119] exe[981064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563962c30ab9 cs:33 sp:7f8e9e0baef8 ax:0 si:20000100 di:ffffffffff600000 [21404468.042989] potentially unexpected fatal signal 11. [21404468.048308] CPU: 11 PID: 39799 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.060392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.070041] RIP: 0033:0x56451ecab0d0 [21404468.074091] Code: 68 05 00 00 00 e9 70 ff ff ff ff 25 8a 3f 15 00 68 18 00 00 00 e9 60 ff ff ff ff 25 82 3f 15 00 68 04 00 00 00 e9 50 ff ff ff 25 7a 3f 15 00 68 03 00 00 00 e9 40 ff ff ff ff 25 72 3f 15 00 [21404468.093328] RSP: 002b:00007feeb4061d78 EFLAGS: 00010246 [21404468.100893] RAX: 00007feeb4062480 RBX: 00007feeb40622e0 RCX: 0000000000000000 [21404468.109813] RDX: 00007feeb4062460 RSI: 0000000000000025 RDI: 000056451ed50390 [21404468.118817] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.127801] R10: 0000000000000000 R11: 0000000000000246 R12: 000056451ed50390 [21404468.137074] R13: 00007feeb4062460 R14: 0000000000000000 R15: 00007feeb40622e0 [21404468.145984] FS: 000056451f962480 GS: 0000000000000000 [21404468.166362] potentially unexpected fatal signal 11. [21404468.173256] CPU: 75 PID: 46770 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.186581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.197641] RIP: 0033:0x55dd5d726a1f [21404468.203080] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21404468.223654] RSP: 002b:00007f96ce12ed78 EFLAGS: 00010283 [21404468.230713] RAX: 0000000000000390 RBX: 00007f96ce12f2e0 RCX: 0000000000000000 [21404468.239683] RDX: 00007f96ce12f460 RSI: 0000000000000025 RDI: 000055dd5d786390 [21404468.248621] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.257566] R10: 0000000000000000 R11: 0000000000000246 R12: 000055dd5d786390 [21404468.266491] R13: 00007f96ce12f460 R14: 0000000000000000 R15: 00007f96ce12f2e0 [21404468.275462] FS: 000055dd5e398480 GS: 0000000000000000 [21404584.235595] potentially unexpected fatal signal 5. [21404584.240865] CPU: 82 PID: 66986 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404584.252794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404584.262434] RIP: 0033:0x7fffffffe062 [21404584.266472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21404584.285669] RSP: 002b:000000c0004a7b90 EFLAGS: 00000297 [21404584.291344] RAX: 0000563b2a8f9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21404584.300259] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000563b2a8f9000 [21404584.309268] RBP: 000000c0004a7c28 R08: 0000000000000009 R09: 000000000d2a5000 [21404584.318194] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0004a7c18 [21404584.327116] R13: 000000c000300f60 R14: 000000c000516540 R15: 000000000000ff63 [21404584.336066] FS: 000000c0004da098 GS: 0000000000000000 [21405224.403174] exe[72601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d1dbaab9 cs:33 sp:7f81d8c3fef8 ax:0 si:200013c0 di:ffffffffff600000 [21405505.198744] exe[71092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.350332] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.430998] exe[70529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.467104] exe[71643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377bc858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.470001] exe[70642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.590081] exe[72792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.695080] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.910677] exe[72607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.994240] exe[70639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405506.075811] exe[70772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405671.605990] potentially unexpected fatal signal 5. [21405671.611224] CPU: 20 PID: 71114 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21405671.623132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21405671.632781] RIP: 0033:0x7fffffffe062 [21405671.636809] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21405671.656007] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [21405671.663037] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21405671.670588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21405671.678139] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [21405671.685678] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [21405671.693331] R13: 000000c00002ab10 R14: 000000c000165a40 R15: 00000000000112ac [21405671.702265] FS: 000000c000180098 GS: 0000000000000000 [21406247.479852] warn_bad_vsyscall: 1 callbacks suppressed [21406247.479857] exe[61396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a0d745db1 cs:33 sp:ffffffffff600010 ax:0 si:ffffffffff600010 di:0 [21406672.952160] exe[109753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5927a6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:e8902000 [21406828.467490] exe[80436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a2365237 cs:33 sp:7ea7c4160ef8 ax:2f700000 si:55e2a23d32f7 di:ffffffffff600000 [21406828.550975] exe[74205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fc2c8a237 cs:33 sp:7ec91270aef8 ax:2f700000 si:557fc2cf82f7 di:ffffffffff600000 [21407145.638672] potentially unexpected fatal signal 5. [21407145.643918] CPU: 20 PID: 117093 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21407145.655893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21407145.665526] RIP: 0033:0x7fffffffe062 [21407145.669556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21407145.690119] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21407145.697155] RAX: 000055b7f414a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21407145.706062] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000055b7f414a000 [21407145.714973] RBP: 000000c0005fbc28 R08: 0000000000000009 R09: 000000000b0da000 [21407145.723881] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005fbc18 [21407145.732799] R13: 000000c00063ff50 R14: 000000c0004ae700 R15: 000000000001bf17 [21407145.741700] FS: 0000000001f6c6b0 GS: 0000000000000000 [21407309.151218] exe[93818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631cc65bab9 cs:33 sp:7f56ce496858 ax:0 si:5631cc6b5097 di:ffffffffff600000 [21407504.435163] exe[80267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b9755237 cs:33 sp:7fe0fc55eef8 ax:2f700000 si:55c5b97c32f7 di:ffffffffff600000 [21407609.119472] exe[74196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169a068ab9 cs:33 sp:7eb34fbfe858 ax:0 si:56169a0c2097 di:ffffffffff600000 [21407609.185560] exe[79066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a21cab9 cs:33 sp:7ecb9a4ae858 ax:0 si:55f03a276097 di:ffffffffff600000 [21408173.940746] exe[144391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abfdfe2ab9 cs:33 sp:7ebf70245ef8 ax:0 si:20006dc0 di:ffffffffff600000 [21408233.874309] exe[108817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a41c6ab9 cs:33 sp:7f76f606e858 ax:0 si:5623a4220062 di:ffffffffff600000 [21408238.236050] exe[152198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581b2b6fab9 cs:33 sp:7fe655250858 ax:0 si:5581b2bc9062 di:ffffffffff600000 [21409098.156763] potentially unexpected fatal signal 5. [21409098.161987] CPU: 11 PID: 163726 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.173956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.183568] RIP: 0033:0x7fffffffe062 [21409098.187566] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409098.206771] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21409098.213816] RAX: 000055b2570a1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409098.222708] RDX: 0000000000000003 RSI: 000000000015f000 RDI: 000055b2570a1000 [21409098.231691] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000e258000 [21409098.240563] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21409098.249493] R13: 000000c000181008 R14: 000000c00058a380 R15: 00000000000152f5 [21409098.258406] FS: 00007f44d4ff96c0 GS: 0000000000000000 [21409098.366349] potentially unexpected fatal signal 11. [21409098.372055] CPU: 55 PID: 87102 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.385354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.396356] RIP: 0033:0x55a52f4900e9 [21409098.401710] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21409098.422284] RSP: 002b:00007f4b50abd448 EFLAGS: 00010213 [21409098.429359] RAX: 0000000000000016 RBX: 000055a52f4da3b9 RCX: 000055a52f4900d7 [21409098.438345] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f4b50abe5c0 [21409098.447262] RBP: 00007f4b50abe59c R08: 0000000028f1e7f8 R09: 0000000000001ab4 [21409098.456179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b50abe5c0 [21409098.465161] R13: 000055a52f4da3b9 R14: 000000000036ed1d R15: 0000000000000002 [21409098.474045] FS: 000055a5300ed480 GS: 0000000000000000 [21409178.283661] potentially unexpected fatal signal 5. [21409178.288914] CPU: 72 PID: 129276 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409178.300910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409178.310532] RIP: 0033:0x7fffffffe062 [21409178.314511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409178.333725] RSP: 002b:000000c000567b90 EFLAGS: 00000297 [21409178.339364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409178.346909] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21409178.354503] RBP: 000000c000567c28 R08: 0000000000000000 R09: 0000000000000000 [21409178.362046] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000567c18 [21409178.369606] R13: 000000c0005703c0 R14: 000000c0001c36c0 R15: 0000000000015df7 [21409178.377190] FS: 0000000001f6c6b0 GS: 0000000000000000 [21410695.578703] exe[209437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b195ebcab9 cs:33 sp:7f844f463ef8 ax:0 si:20000140 di:ffffffffff600000 [21410745.179272] exe[215759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8ef29fab9 cs:33 sp:7f7ddc9feef8 ax:0 si:20000140 di:ffffffffff600000 [21410847.804242] exe[217676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d5cdb6ab9 cs:33 sp:7ea0051ecef8 ax:0 si:20000140 di:ffffffffff600000 [21410918.586677] exe[225895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b67ec8bab9 cs:33 sp:7ff69cdfeef8 ax:0 si:20000140 di:ffffffffff600000 [21410939.443332] exe[231251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f94bdab9 cs:33 sp:7f6dcbd44ef8 ax:0 si:20000140 di:ffffffffff600000 [21410963.291288] exe[228003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e0399ab9 cs:33 sp:7ee7e0fa2ef8 ax:0 si:20000140 di:ffffffffff600000 [21410977.914153] exe[234939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4ada35ab9 cs:33 sp:7ff625524ef8 ax:0 si:20000140 di:ffffffffff600000 [21411015.800054] exe[231292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639d0a9aab9 cs:33 sp:7fec5dc80ef8 ax:0 si:20000140 di:ffffffffff600000 [21411079.323173] exe[236966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642e4282ab9 cs:33 sp:7fce88b80ef8 ax:0 si:20000140 di:ffffffffff600000 [21412580.277588] exe[237259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629192e4237 cs:33 sp:7eac6eea6ef8 ax:2f700000 si:5629193522f7 di:ffffffffff600000 [21413091.444697] exe[271381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e8a450ab9 cs:33 sp:7effb33feef8 ax:0 si:20000140 di:ffffffffff600000 [21413094.547093] exe[272360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f3a9a1ab9 cs:33 sp:7f26beb25858 ax:0 si:558f3a9fb062 di:ffffffffff600000 [21413677.566332] potentially unexpected fatal signal 5. [21413677.571569] CPU: 27 PID: 283136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21413677.583551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21413677.593215] RIP: 0033:0x7fffffffe062 [21413677.597206] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21413677.616461] RSP: 002b:000000c000605b90 EFLAGS: 00000297 [21413677.622093] RAX: 000055f510639000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21413677.629653] RDX: 0000000000000001 RSI: 00000000001c7000 RDI: 000055f510639000 [21413677.638585] RBP: 000000c000605c28 R08: 0000000000000009 R09: 0000000014b94000 [21413677.647527] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000605c18 [21413677.656441] R13: 000000c0005fe150 R14: 000000c00017c8c0 R15: 0000000000043406 [21413677.664021] FS: 0000000001f6c6b0 GS: 0000000000000000 [21413874.031603] exe[227076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a7c081237 cs:33 sp:7ed56a10eef8 ax:2f700000 si:563a7c0ef2f7 di:ffffffffff600000 [21414181.873992] potentially unexpected fatal signal 5. [21414181.879201] CPU: 93 PID: 230861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21414181.891197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21414181.900818] RIP: 0033:0x7fffffffe062 [21414181.904788] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21414181.923967] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21414181.929583] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21414181.937128] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000056252a200000 [21414181.944723] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21414181.953634] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21414181.961221] R13: 000000c00017c008 R14: 000000c000588540 R15: 0000000000037ab8 [21414181.970154] FS: 00007feeb4b5a6c0 GS: 0000000000000000 [21414226.844684] exe[234963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563733e07237 cs:33 sp:7f69d93faef8 ax:2f700000 si:563733e752f7 di:ffffffffff600000 [21414374.531922] exe[290459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3e9963ab9 cs:33 sp:7fb827593ef8 ax:0 si:20000140 di:ffffffffff600000 [21414467.498144] exe[300889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a855fa8ab9 cs:33 sp:7f4a31072858 ax:0 si:55a856002062 di:ffffffffff600000 [21414819.731107] exe[313252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b4bc0ab9 cs:33 sp:7eeb93c37ef8 ax:0 si:20000040 di:ffffffffff600000 [21415079.281734] exe[327751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcaae4ab9 cs:33 sp:7f9e03a34858 ax:0 si:555bcab3e097 di:ffffffffff600000 [21415470.366210] exe[299675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56495b2e3237 cs:33 sp:7eca0fe3def8 ax:2f700000 si:56495b3512f7 di:ffffffffff600000 [21415688.076592] exe[311738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564057a6fab9 cs:33 sp:7ec9287feef8 ax:0 si:20000140 di:ffffffffff600000 [21415914.905283] exe[272401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e08999ab9 cs:33 sp:7f4d913c5ef8 ax:0 si:20000140 di:ffffffffff600000 [21416086.539575] exe[343301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6b353ab9 cs:33 sp:7f361c279858 ax:0 si:558d6b3ad097 di:ffffffffff600000 [21416313.855746] exe[334477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648d88aab9 cs:33 sp:7fe1398a0ef8 ax:0 si:20000040 di:ffffffffff600000 [21416476.302322] exe[299449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f41ca43ab9 cs:33 sp:7ec7eb74a858 ax:0 si:55f41ca9d070 di:ffffffffff600000 [21416992.346108] exe[343445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b011ad237 cs:33 sp:7fc51cd48ef8 ax:2f700000 si:555b0121b2f7 di:ffffffffff600000 [21416995.013634] exe[289231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef52f3e237 cs:33 sp:7f82bfee5ef8 ax:2f700000 si:55ef52fac2f7 di:ffffffffff600000 [21417004.315615] exe[361033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4a783d237 cs:33 sp:7f9c19decef8 ax:2f700000 si:55e4a78ab2f7 di:ffffffffff600000 [21417052.468372] exe[343142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56153fba7ab9 cs:33 sp:7fd13f3ec858 ax:0 si:56153fc01062 di:ffffffffff600000 [21417053.386610] exe[348835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562422cb4ab9 cs:33 sp:7f00818ec858 ax:0 si:562422d0e062 di:ffffffffff600000 [21417279.378515] exe[355136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56319d6c2237 cs:33 sp:7f663831fef8 ax:2f700000 si:56319d7302f7 di:ffffffffff600000 [21417282.068540] exe[359128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476ba3a237 cs:33 sp:7fc09bddbef8 ax:2f700000 si:56476baa82f7 di:ffffffffff600000 [21417354.242153] exe[309352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564824e0f237 cs:33 sp:7f4641071ef8 ax:2f700000 si:564824e7d2f7 di:ffffffffff600000 [21417358.958207] exe[298270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2506b237 cs:33 sp:7ebc3c70fef8 ax:2f700000 si:564e250d92f7 di:ffffffffff600000 [21417367.533780] exe[343241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc91188237 cs:33 sp:7f31d5a32ef8 ax:2f700000 si:55fc911f62f7 di:ffffffffff600000 [21417378.708841] exe[323581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a631963237 cs:33 sp:7ff60a738ef8 ax:2f700000 si:55a6319d12f7 di:ffffffffff600000 [21417394.174444] exe[343585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4d139237 cs:33 sp:7ed3ddde9ef8 ax:2f700000 si:55af4d1a72f7 di:ffffffffff600000 [21417446.157077] exe[317577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626fb3d9237 cs:33 sp:7ec69d503ef8 ax:2f700000 si:5626fb4472f7 di:ffffffffff600000 [21417645.408545] exe[337956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547af11ab9 cs:33 sp:7f414cd6e858 ax:0 si:56547af6b062 di:ffffffffff600000 [21417665.879520] potentially unexpected fatal signal 5. [21417665.884749] CPU: 41 PID: 355852 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417665.896750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417665.906417] RIP: 0033:0x7fffffffe062 [21417665.910395] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417665.929576] RSP: 002b:000000c0005cdb90 EFLAGS: 00000297 [21417665.935249] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417665.944151] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417665.951861] RBP: 000000c0005cdc28 R08: 0000000000000000 R09: 0000000000000000 [21417665.960783] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005cdc18 [21417665.968364] R13: 000000c0005e23c0 R14: 000000c000164a80 R15: 0000000000056cc2 [21417665.977303] FS: 0000000001f6c6b0 GS: 0000000000000000 [21417672.128457] potentially unexpected fatal signal 5. [21417672.133695] CPU: 94 PID: 356651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417672.145678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417672.155405] RIP: 0033:0x7fffffffe062 [21417672.159470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417672.180022] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21417672.187098] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417672.194717] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417672.203644] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21417672.212532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21417672.221459] R13: 000000c000030b10 R14: 000000c0004cddc0 R15: 0000000000056cc3 [21417672.230396] FS: 000000c000580098 GS: 0000000000000000 [21417795.857646] exe[372952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c1b74237 cs:33 sp:7fa71c89bef8 ax:2f700000 si:55e0c1be22f7 di:ffffffffff600000 [21417811.018308] exe[322365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a13dd237 cs:33 sp:7fd4ed19aef8 ax:2f700000 si:55d1a144b2f7 di:ffffffffff600000 [21418869.563407] potentially unexpected fatal signal 5. [21418869.568635] CPU: 84 PID: 400098 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418869.580633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418869.590266] RIP: 0033:0x7fffffffe062 [21418869.594253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418869.613440] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21418869.619084] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21418869.626670] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21418869.635703] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21418869.644638] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21418869.653678] R13: 000000c000030b10 R14: 000000c000492380 R15: 000000000005aaaa [21418869.662619] FS: 0000000001f6c6b0 GS: 0000000000000000 [21418882.881935] potentially unexpected fatal signal 11. [21418882.887258] CPU: 72 PID: 375225 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.899263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.908973] RIP: 0033:0x556abcfd4d97 [21418882.913013] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21418882.933675] RSP: 002b:00007fd6c974bc90 EFLAGS: 00010206 [21418882.935443] potentially unexpected fatal signal 5. [21418882.939296] RAX: 00007fd6c974c500 RBX: 00007fd6c974c1f0 RCX: 0000000000000000 [21418882.945894] CPU: 6 PID: 372495 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.945897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.945905] RIP: 0033:0x7fffffffe062 [21418882.945908] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418882.945909] RSP: 002b:000000c0005f9b90 EFLAGS: 00000297 [21418882.945911] RAX: 000000000006311e RBX: 0000000000000000 RCX: 00007fffffffe05a [21418882.945912] RDX: 0000000000000000 RSI: 000000c0005fa000 RDI: 0000000000012f00 [21418882.945913] RBP: 000000c0005f9c28 R08: 000000c000609a50 R09: 0000000000000000 [21418882.945914] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f9c18 [21418882.945915] R13: 000000c000601f50 R14: 000000c0004c6a80 R15: 000000000005aab0 [21418882.945920] FS: 000000c000180098 GS: 0000000000000000 [21418882.954792] RDX: 00007fd6c974c370 RSI: 0000556abd0573d8 RDI: 00007fd6c974c1f0 [21418882.954794] RBP: 00007fd6c974c2e0 R08: 0000000000000000 R09: 0000000000000000 [21418882.954795] R10: 0000000000001000 R11: 0000000000000293 R12: 0000556abd0573d8 [21418882.954796] R13: 00007fd6c974c370 R14: 0000000000000000 R15: 00007fd6c974c1f0 [21418882.954798] FS: 0000556abdc6a480 GS: 0000000000000000 [21418920.255201] exe[387465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639567da237 cs:33 sp:7fe1f9554ef8 ax:2f700000 si:5639568482f7 di:ffffffffff600000 [21419227.581174] exe[413105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f6c104ab9 cs:33 sp:7f64497afef8 ax:0 si:20000040 di:ffffffffff600000 [21419227.714228] exe[390319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c763cbab9 cs:33 sp:7fd90e2feef8 ax:0 si:20000040 di:ffffffffff600000 [21419496.098609] exe[399043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563659024ab9 cs:33 sp:7fe944867858 ax:0 si:56365907e097 di:ffffffffff600000 [21419627.711405] exe[410343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651cffdc237 cs:33 sp:7f98a7d88ef8 ax:2f700000 si:5651d004a2f7 di:ffffffffff600000 [21419952.928000] exe[382306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560619adc237 cs:33 sp:7f801e926ef8 ax:2f700000 si:560619b4a2f7 di:ffffffffff600000 [21420135.989010] exe[379783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee7e53ab9 cs:33 sp:7ff75390d858 ax:0 si:560ee7ead062 di:ffffffffff600000 [21420149.162911] exe[428734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d5b17ab9 cs:33 sp:7f0de753a858 ax:0 si:55f8d5b71062 di:ffffffffff600000 [21420165.434399] exe[392340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557601ea6ab9 cs:33 sp:7fb25bd89858 ax:0 si:557601f00062 di:ffffffffff600000 [21420182.749924] exe[439583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56311a977ab9 cs:33 sp:7f629cdf6858 ax:0 si:56311a9d1062 di:ffffffffff600000 [21420186.574670] exe[272414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146968cab9 cs:33 sp:7f365b6e1858 ax:0 si:5614696e6062 di:ffffffffff600000 [21420196.519938] exe[405618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583eed66ab9 cs:33 sp:7f60ca22a858 ax:0 si:5583eedc0062 di:ffffffffff600000 [21420204.480305] exe[399868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608e9f55ab9 cs:33 sp:7ed736ce9858 ax:0 si:5608e9faf062 di:ffffffffff600000 [21420232.163961] exe[432620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd834f9ab9 cs:33 sp:7eada6122858 ax:0 si:55bd83553062 di:ffffffffff600000 [21420329.551403] exe[429279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7f475ab9 cs:33 sp:7f354a725858 ax:0 si:55da7f4cf062 di:ffffffffff600000 [21420329.964186] exe[375874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557189982ab9 cs:33 sp:7fd2faada858 ax:0 si:5571899dc062 di:ffffffffff600000 [21420334.991102] exe[427890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563048d35ab9 cs:33 sp:7fd4a2c88858 ax:0 si:563048d8f062 di:ffffffffff600000 [21420349.544016] potentially unexpected fatal signal 5. [21420349.549265] CPU: 66 PID: 441220 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21420349.561260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21420349.570947] RIP: 0033:0x7fffffffe062 [21420349.574942] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21420349.595512] RSP: 002b:000000c000609b90 EFLAGS: 00000297 [21420349.602546] RAX: 0000557bf2c00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21420349.611481] RDX: 0000000000000001 RSI: 00000000000ef000 RDI: 0000557bf2c00000 [21420349.620409] RBP: 000000c000609c28 R08: 0000000000000009 R09: 0000000015b46000 [21420349.629368] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000609c18 [21420349.638329] R13: 000000c00040ee10 R14: 000000c000228540 R15: 000000000006a54e [21420349.645870] FS: 000000c00013a898 GS: 0000000000000000 [21420406.153110] exe[431787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565476397ab9 cs:33 sp:7ebd7759d858 ax:0 si:5654763f1062 di:ffffffffff600000 [21420479.492378] exe[443288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55805818aab9 cs:33 sp:7ef02d731858 ax:0 si:5580581e4062 di:ffffffffff600000 [21420659.373746] exe[442359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564a0308ab9 cs:33 sp:7ef018e96858 ax:0 si:5564a0362070 di:ffffffffff600000 [21421168.683021] exe[456523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56442ee92ab9 cs:33 sp:7f2a5a725ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.836524] exe[455536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.878803] exe[455534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421667.104325] exe[472591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615d9d47ab9 cs:33 sp:7f627e1f7858 ax:0 si:5615d9da1062 di:ffffffffff600000 [21421935.874941] exe[473074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eec7bcab9 cs:33 sp:7fa9107a7858 ax:0 si:563eec816062 di:ffffffffff600000 [21422389.181534] potentially unexpected fatal signal 5. [21422389.186781] CPU: 75 PID: 476143 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422389.198767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422389.208385] RIP: 0033:0x7fffffffe062 [21422389.212380] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422389.231586] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [21422389.237305] RAX: 00007fb37088a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422389.244877] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007fb37088a000 [21422389.253818] RBP: 000000c0005f1c28 R08: 0000000000000009 R09: 00000000045e0000 [21422389.262744] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005f1c18 [21422389.271675] R13: 000000c0005f9f50 R14: 000000c000521dc0 R15: 0000000000070eab [21422389.280603] FS: 000000c000180098 GS: 0000000000000000 [21422714.122087] potentially unexpected fatal signal 5. [21422714.127525] CPU: 46 PID: 475747 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422714.139553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422714.149183] RIP: 0033:0x7fffffffe062 [21422714.153174] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422714.172440] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21422714.179472] RAX: 0000563cb8b07000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422714.188406] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 0000563cb8b07000 [21422714.195965] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000c6ff000 [21422714.204894] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21422714.213825] R13: 0000000002883b00 R14: 000000c000478700 R15: 0000000000072300 [21422714.222794] FS: 0000000003ce43c0 GS: 0000000000000000 [21422781.815126] exe[480206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cca865fab9 cs:33 sp:7fa5b5798ef8 ax:0 si:20000100 di:ffffffffff600000 [21422781.862979] exe[473398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559370016ab9 cs:33 sp:7fea99afcef8 ax:0 si:20000100 di:ffffffffff600000 [21422782.432156] exe[501469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555858d47ab9 cs:33 sp:7f9ef4501ef8 ax:0 si:20000100 di:ffffffffff600000 [21422798.792530] exe[495270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d155300ab9 cs:33 sp:7f3b4d1feef8 ax:0 si:20000100 di:ffffffffff600000 [21422800.168510] exe[501598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e93e360ab9 cs:33 sp:7ee4e6dfeef8 ax:0 si:20000100 di:ffffffffff600000 [21422886.598314] exe[492672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561375d88ab9 cs:33 sp:7f8c0c350858 ax:0 si:561375de2097 di:ffffffffff600000 [21423064.075030] exe[500036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580178e6ab9 cs:33 sp:7eab8c981ef8 ax:0 si:20000100 di:ffffffffff600000 [21423115.423770] exe[507029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56125d61bab9 cs:33 sp:7fda9b15def8 ax:0 si:20000100 di:ffffffffff600000 [21423245.610238] exe[492162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa9c9bab9 cs:33 sp:7f8f23e9eef8 ax:0 si:20000100 di:ffffffffff600000 [21423253.973916] exe[503545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6c256ab9 cs:33 sp:7ead26e64ef8 ax:0 si:20000100 di:ffffffffff600000 [21423257.872556] exe[515379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e5fe17ab9 cs:33 sp:7f96765bcef8 ax:0 si:20000100 di:ffffffffff600000 [21423259.150903] exe[494752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f579554ab9 cs:33 sp:7f04f1882ef8 ax:0 si:20000100 di:ffffffffff600000 [21423260.857545] exe[515178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556ba768ab9 cs:33 sp:7f7be64ceef8 ax:0 si:20000100 di:ffffffffff600000 [21423774.494340] exe[533990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561211dc1ab9 cs:33 sp:7ff80f9feef8 ax:0 si:20000100 di:ffffffffff600000 [21423788.333423] exe[453563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1b1d8ab9 cs:33 sp:7fb2138ab858 ax:0 si:558d1b232097 di:ffffffffff600000 [21424176.137134] exe[543495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d064b99237 cs:33 sp:7eac176f5ef8 ax:2f700000 si:55d064c072f7 di:ffffffffff600000 [21424359.943496] exe[539219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6f9d14ab9 cs:33 sp:7ef3b70ff858 ax:0 si:55b6f9d6e062 di:ffffffffff600000 [21424737.360543] potentially unexpected fatal signal 11. [21424737.365844] CPU: 50 PID: 535063 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.371332] potentially unexpected fatal signal 11. [21424737.377836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383129] CPU: 15 PID: 531887 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.383131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383136] RIP: 0033:0x55821dacb37b [21424737.383139] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21424737.383140] RSP: 002b:00007fa94f4d0310 EFLAGS: 00010246 [21424737.383141] RAX: 00007fa94f4d0470 RBX: 00007fa94f4d0470 RCX: 0000000000000000 [21424737.383142] RDX: 00007f7d64c000a8 RSI: 00007fa94f4d04d0 RDI: 00007fa94f4d04f0 [21424737.383142] RBP: 0000000000000000 R08: 00007f7d64c000a8 R09: 000055821dc3ff8c [21424737.383143] R10: 0000000000000004 R11: 00000000861c4adb R12: 000055821dc3ff80 [21424737.383144] R13: 0000000000000af9 R14: 000055821dc3ff80 R15: 00007fa94f4d0418 [21424737.383144] FS: 000055821e770480 GS: 0000000000000000 [21424737.494775] RIP: 0033:0x556cd89cc6ac [21424737.500170] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21424737.520729] RSP: 002b:00007f7d130ae308 EFLAGS: 00010206 [21424737.527710] RAX: 0000000020000100 RBX: 00007f7d130ae418 RCX: 00007fad42400000 [21424737.536646] RDX: 0000000000000013 RSI: 00007fad42400020 RDI: 0000000020000100 [21424737.545567] RBP: 0000000000000001 R08: 00007fad42800000 R09: 000000000000083c [21424737.553101] R10: 00ab42c8fa2b88ab R11: 00000000861c4adb R12: 00007fad42400000 [21424737.562021] R13: fffffffffffffffe R14: 00007fad42400000 R15: 00007fad42400008 [21424737.570958] FS: 0000556cd964a480 GS: 0000000000000000 [21424814.428219] exe[484275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c97c069ab9 cs:33 sp:7f7e21294858 ax:0 si:55c97c0c3097 di:ffffffffff600000 [21424879.096426] exe[553983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e3d8b0ab9 cs:33 sp:7ed196e35ef8 ax:0 si:20000100 di:ffffffffff600000 [21424909.191034] exe[533584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e069feab9 cs:33 sp:7f71852b9858 ax:0 si:555e06a58062 di:ffffffffff600000 [21424977.742936] exe[554425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ce7185ab9 cs:33 sp:7f3da09bbef8 ax:0 si:20000100 di:ffffffffff600000 [21425077.834799] potentially unexpected fatal signal 5. [21425077.840013] CPU: 46 PID: 472772 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425077.851998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425077.861649] RIP: 0033:0x7fffffffe062 [21425077.865630] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425077.884864] RSP: 002b:000000c0007b7b90 EFLAGS: 00000297 [21425077.891873] RAX: 000056453acd9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425077.900803] RDX: 0000000000000003 RSI: 0000000000127000 RDI: 000056453acd9000 [21425077.909718] RBP: 000000c0007b7c28 R08: 0000000000000009 R09: 00000000104bc000 [21425077.918695] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0007b7c18 [21425077.927568] R13: 000000c0007c0b10 R14: 000000c0001b16c0 R15: 00000000000727c8 [21425077.936467] FS: 000000c000180098 GS: 0000000000000000 [21425179.152800] exe[481605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bf37d5ab9 cs:33 sp:7fd617363ef8 ax:0 si:20001080 di:ffffffffff600000 [21425260.659314] exe[565057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602369a4ab9 cs:33 sp:7ee53a0d2858 ax:0 si:5602369fe062 di:ffffffffff600000 [21425510.766958] potentially unexpected fatal signal 5. [21425510.772176] CPU: 26 PID: 569353 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425510.784159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425510.793829] RIP: 0033:0x7fffffffe062 [21425510.797817] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425510.817044] RSP: 002b:000000c0007fbbe8 EFLAGS: 00000297 [21425510.822738] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425510.831649] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21425510.839189] RBP: 000000c0007fbc80 R08: 0000000000000000 R09: 0000000000000000 [21425510.848259] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007fbc70 [21425510.857207] R13: 000000c00043b000 R14: 000000c000496fc0 R15: 0000000000074fc4 [21425510.866111] FS: 000000c00013a898 GS: 0000000000000000 [21425669.438140] exe[538951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425672.977026] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425673.088074] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319e94858 ax:0 si:561713c1d062 di:ffffffffff600000 [21426112.590278] potentially unexpected fatal signal 5. [21426112.595488] CPU: 95 PID: 544897 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21426112.607494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21426112.617283] RIP: 0033:0x7fffffffe062 [21426112.621259] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21426112.640544] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21426112.646224] RAX: 00007f81ef359000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21426112.655140] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f81ef359000 [21426112.664066] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000baec000 [21426112.673030] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21426112.681944] R13: 0000000002883b00 R14: 000000c000582700 R15: 0000000000081dfa [21426112.690890] FS: 00000000052e33c0 GS: 0000000000000000 [21426378.945349] exe[589220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5f9c41db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426378.996648] exe[586911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426379.008138] exe[589115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426828.608820] exe[581221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579927f3ab9 cs:33 sp:7f1bb05d1858 ax:0 si:55799284d062 di:ffffffffff600000 [21427735.979112] exe[594404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739392bab9 cs:33 sp:7ec64745f858 ax:0 si:557393985097 di:ffffffffff600000 [21427737.253852] potentially unexpected fatal signal 5. [21427737.259095] CPU: 90 PID: 542877 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21427737.271095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21427737.280736] RIP: 0033:0x7fffffffe062 [21427737.284763] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21427737.304013] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [21427737.311022] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21427737.319957] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21427737.328889] RBP: 000000c000209c28 R08: 0000000000000000 R09: 0000000000000000 [21427737.338169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000209c18 [21427737.347110] R13: 000000c0001b0b10 R14: 000000c00015ea80 R15: 0000000000084622 [21427737.356043] FS: 000000c00013b098 GS: 0000000000000000 [21428569.550553] potentially unexpected fatal signal 11. [21428569.555874] CPU: 25 PID: 608073 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428569.567878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428569.577520] RIP: 0033:0x564960a78a1f [21428569.581521] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21428569.600827] RSP: 002b:00007f7d1eb7dd78 EFLAGS: 00010283 [21428569.606476] RAX: 0000000000000390 RBX: 00007f7d1eb7e2e0 RCX: 0000000000000000 [21428569.614075] RDX: 00007f7d1eb7e460 RSI: 0000000000000025 RDI: 0000564960ad8390 [21428569.623087] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21428569.630629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000564960ad8390 [21428569.639573] R13: 00007f7d1eb7e460 R14: 0000000000000000 R15: 00007f7d1eb7e2e0 [21428569.648536] FS: 00005649616ea480 GS: 0000000000000000 [21428694.433657] potentially unexpected fatal signal 5. [21428694.439009] CPU: 24 PID: 629512 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.447321] potentially unexpected fatal signal 11. [21428694.450994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456298] CPU: 42 PID: 625503 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.456300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456305] RIP: 0033:0x7fadfe9ed20b [21428694.456308] Code: 48 89 16 48 69 d2 00 ca 9a 3b 49 29 d0 4c 89 46 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 48 89 fe 48 8d 0d f5 dd ff ff <48> 8b 39 83 e7 fe 48 8b 59 08 4c 8b 41 18 4c 8b 51 10 4c 8b 59 20 [21428694.456310] RSP: 002b:00007f7e572fb2d0 EFLAGS: 00010202 [21428694.456312] RAX: 0000000000000002 RBX: 0000000000000003 RCX: 00007fadfe9eb000 [21428694.456313] RDX: 0000001b2c220004 RSI: 00007f7e572fb2f0 RDI: 00007f7e572fb2f0 [21428694.456314] RBP: 0000000000000001 R08: 0000001b2c260000 R09: 0000000000000000 [21428694.456315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21428694.456316] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21428694.456317] FS: 00005584115ea480 GS: 0000000000000000 [21428694.561033] RIP: 0033:0x7fffffffe062 [21428694.565046] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21428694.585621] RSP: 002b:000000c0005dbb90 EFLAGS: 00000297 [21428694.592643] RAX: 00007f438d0b5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21428694.601586] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f438d0b5000 [21428694.610508] RBP: 000000c0005dbc28 R08: 0000000000000009 R09: 0000000006df9000 [21428694.619458] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005dbc18 [21428694.628371] R13: 000000c0005e5f50 R14: 000000c000160fc0 R15: 00000000000988da [21428694.637276] FS: 0000000001f6c6b0 GS: 0000000000000000 [21429188.677114] exe[642538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67de227ef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.785521] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.805062] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.824531] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.844626] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.864681] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.886689] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.910230] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.931177] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.951547] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429933.425603] warn_bad_vsyscall: 24 callbacks suppressed [21429933.425607] exe[640758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a86f9cab9 cs:33 sp:7edce0bd4ef8 ax:0 si:20010000 di:ffffffffff600000 [21431590.769269] exe[680470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db8d4a9ab9 cs:33 sp:7f1740045ef8 ax:0 si:200001c0 di:ffffffffff600000 [21431751.762947] potentially unexpected fatal signal 5. [21431751.768195] CPU: 86 PID: 699136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431751.780200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431751.789870] RIP: 0033:0x7fffffffe062 [21431751.793870] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431751.814493] RSP: 002b:000000c0005e3b90 EFLAGS: 00000297 [21431751.821453] RAX: 00007fb2af491000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431751.830398] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2af491000 [21431751.839336] RBP: 000000c0005e3c28 R08: 0000000000000009 R09: 000000000b5db000 [21431751.848256] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005e3c18 [21431751.857184] R13: 000000c0003b1f50 R14: 000000c0001a7a40 R15: 00000000000a8b80 [21431751.866089] FS: 000000c00013a898 GS: 0000000000000000 [21431964.683880] potentially unexpected fatal signal 5. [21431964.689105] CPU: 29 PID: 676257 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431964.701096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431964.710759] RIP: 0033:0x7fffffffe062 [21431964.714818] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431964.735345] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21431964.742402] RAX: 0000001b31e20000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431964.751341] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b31e20000 [21431964.760268] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000001ea00000 [21431964.769209] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21431964.778148] R13: 000000c000143808 R14: 000000c0002f08c0 R15: 0000000000099f66 [21431964.787118] FS: 00007fd3a4f9d6c0 GS: 0000000000000000 [21432163.247809] exe[710159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557031b55ab9 cs:33 sp:7fbcd7b06858 ax:0 si:557031baf062 di:ffffffffff600000 [21432389.667880] exe[710626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647dc726ab9 cs:33 sp:7f7cf6f92858 ax:0 si:5647dc780062 di:ffffffffff600000 [21432428.881541] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432428.949789] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432439.221265] exe[710668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558368e0aab9 cs:33 sp:7fd6c8fc7ef8 ax:0 si:20002f00 di:ffffffffff600000 [21432899.802297] exe[720179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3083bdab9 cs:33 sp:7ebf2be27858 ax:0 si:55a308417062 di:ffffffffff600000 [21434471.207008] potentially unexpected fatal signal 5. [21434471.212251] CPU: 9 PID: 743711 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21434471.224157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21434471.233797] RIP: 0033:0x7fffffffe062 [21434471.237783] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21434471.257076] RSP: 002b:000000c000177b90 EFLAGS: 00000297 [21434471.264011] RAX: 00000000000baa3d RBX: 0000000000000000 RCX: 00007fffffffe05a [21434471.272922] RDX: 0000000000000000 RSI: 000000c000178000 RDI: 0000000000012f00 [21434471.281823] RBP: 000000c000177c28 R08: 000000c000612100 R09: 0000000000000000 [21434471.289447] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000177c18 [21434471.298355] R13: 000000c000154b10 R14: 000000c000520fc0 R15: 00000000000b590e [21434471.307349] FS: 000000c00013a898 GS: 0000000000000000 [21434898.249079] exe[754112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca1540ab9 cs:33 sp:7f896d102858 ax:0 si:563ca159a062 di:ffffffffff600000 [21434912.779819] exe[729417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f57e2fab9 cs:33 sp:7ea2e2d84858 ax:0 si:564f57e89097 di:ffffffffff600000 [21435018.256422] exe[742742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e86f8f237 cs:33 sp:7fc1a6660ef8 ax:2f700000 si:562e86ffd2f7 di:ffffffffff600000 [21435027.261075] exe[752755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e522a1e237 cs:33 sp:7fb6dc3feef8 ax:2f700000 si:55e522a8c2f7 di:ffffffffff600000 [21435058.934676] exe[712756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fad20c237 cs:33 sp:7f7970d92ef8 ax:2f700000 si:560fad27a2f7 di:ffffffffff600000 [21435061.086039] exe[759052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613f4023237 cs:33 sp:7f3491affef8 ax:2f700000 si:5613f40912f7 di:ffffffffff600000 [21435062.680374] exe[733013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f219d4237 cs:33 sp:7fa7a8352ef8 ax:2f700000 si:562f21a422f7 di:ffffffffff600000 [21435070.802628] exe[738348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab78188237 cs:33 sp:7f4913b50ef8 ax:2f700000 si:55ab781f62f7 di:ffffffffff600000 [21435089.543566] exe[738731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581275bf237 cs:33 sp:7ff20788fef8 ax:2f700000 si:55812762d2f7 di:ffffffffff600000 [21435101.538703] exe[758396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c200e3a237 cs:33 sp:7eb1e4e94ef8 ax:2f700000 si:55c200ea82f7 di:ffffffffff600000 [21435117.794990] exe[768312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558126b73237 cs:33 sp:7f7090944ef8 ax:2f700000 si:558126be12f7 di:ffffffffff600000 [21435141.841988] exe[717389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55919af3ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435141.990599] exe[733100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56055e446db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435178.642760] exe[735334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628a58b4ab9 cs:33 sp:7fed11b93858 ax:0 si:5628a590e062 di:ffffffffff600000 [21435556.812886] exe[757440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9c8779ab9 cs:33 sp:7ff0bd9fe858 ax:0 si:55a9c87d3062 di:ffffffffff600000 [21435636.093884] exe[737891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625376f9237 cs:33 sp:7fbca8296ef8 ax:2f700000 si:5625377672f7 di:ffffffffff600000 [21435658.773234] exe[739338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55768aea1ab9 cs:33 sp:7fe8f7c66ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435720.148295] exe[782278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab177aaab9 cs:33 sp:7ebf11d06ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435725.082334] exe[780474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f95af03ab9 cs:33 sp:7fa4e8ffeef8 ax:0 si:20000b40 di:ffffffffff600000 [21435726.709609] exe[719358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acf2e9dab9 cs:33 sp:7f17766f3ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435733.259669] exe[750485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572632aaab9 cs:33 sp:7f7dc6b41ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435735.097883] exe[776852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b02ff2ab9 cs:33 sp:7f0c19acbef8 ax:0 si:20000b40 di:ffffffffff600000 [21435757.531361] exe[783013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9154ab9 cs:33 sp:7ed5913a0ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435766.395683] exe[778549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fb0f1fab9 cs:33 sp:7f1783447ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435815.586089] exe[783059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9150237 cs:33 sp:7ed5913a0ef8 ax:2f700000 si:5633c91be2f7 di:ffffffffff600000 [21435994.083734] exe[787496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561230c35ab9 cs:33 sp:7feca3d04ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436134.849853] exe[759518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d82a08ab9 cs:33 sp:7effd1f0bef8 ax:0 si:20000b40 di:ffffffffff600000 [21436227.287630] exe[776519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562427370ab9 cs:33 sp:7fabb3144ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436347.050890] potentially unexpected fatal signal 5. [21436347.056127] CPU: 7 PID: 726699 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21436347.068133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21436347.077789] RIP: 0033:0x7fffffffe062 [21436347.081792] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21436347.101013] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21436347.106656] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21436347.115605] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21436347.124497] RBP: 000000c0007b5c80 R08: 0000000000000000 R09: 0000000000000000 [21436347.133407] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007b5c70 [21436347.142309] R13: 000000c0007c0000 R14: 000000c00058ca80 R15: 00000000000b152f [21436347.151227] FS: 000000c000180898 GS: 0000000000000000 [21436452.039827] exe[797561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff2dab9 cs:33 sp:7f6ff9e2def8 ax:0 si:20000b40 di:ffffffffff600000 [21436462.866410] exe[785171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff29237 cs:33 sp:7f6ff9e2def8 ax:2f700000 si:55decff972f7 di:ffffffffff600000 [21436596.434022] exe[786694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bade2b9ab9 cs:33 sp:7ecdf30e7ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436862.244475] exe[807416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3dfd9d237 cs:33 sp:7ef2ceda4ef8 ax:2f700000 si:55b3dfe0b2f7 di:ffffffffff600000 [21437376.184571] potentially unexpected fatal signal 5. [21437376.189790] CPU: 81 PID: 776579 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21437376.201754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21437376.211389] RIP: 0033:0x7fffffffe062 [21437376.215405] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21437376.234642] RSP: 002b:000000c000775be8 EFLAGS: 00000297 [21437376.240324] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21437376.247900] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21437376.255445] RBP: 000000c000775c80 R08: 0000000000000000 R09: 0000000000000000 [21437376.264405] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000775c70 [21437376.273314] R13: 000000c0004cd800 R14: 000000c00037d6c0 R15: 00000000000b823c [21437376.282282] FS: 000000c00048c098 GS: 0000000000000000 [21437433.745115] exe[815747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aebb92dab9 cs:33 sp:7ea1ac068ef8 ax:0 si:20000b40 di:ffffffffff600000 [21437448.265841] exe[815707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c79ad237 cs:33 sp:7ecdade21ef8 ax:2f700000 si:55a1c7a1b2f7 di:ffffffffff600000 [21438032.466280] potentially unexpected fatal signal 11. [21438032.471576] CPU: 23 PID: 825418 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438032.483821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438032.493479] RIP: 0033:0x5591a892669b [21438032.497482] Code: fa 10 73 2d 83 fa 08 73 46 83 fa 04 73 16 83 fa 01 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 <89> 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 c5 fa 7f 07 c5 [21438032.518074] RSP: 002b:00007f725b6fc308 EFLAGS: 00010202 [21438032.523716] RAX: 00000000200001c0 RBX: 00007f725b6fc418 RCX: 00000000aaaaaaaa [21438032.531283] RDX: 0000000000000005 RSI: 00000000aaaaaaaa RDI: 00000000200001c0 [21438032.540193] RBP: 0000000000000001 R08: 00007f714ca00000 R09: 0000000000000660 [21438032.547761] R10: 00ab5dfe1fe97b85 R11: 00000000861c4ac9 R12: 00007f714c600000 [21438032.555334] R13: fffffffffffffffe R14: 00007f714c600000 R15: 00007f714c600008 [21438032.562987] FS: 00005591a95a4480 GS: 0000000000000000 [21438064.081998] potentially unexpected fatal signal 5. [21438064.087253] CPU: 47 PID: 815735 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438064.099263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438064.108911] RIP: 0033:0x7fffffffe062 [21438064.112957] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21438064.133565] RSP: 002b:000000c000651b90 EFLAGS: 00000297 [21438064.140571] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21438064.149492] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000560c09000000 [21438064.158570] RBP: 000000c000651c28 R08: 0000000000000000 R09: 0000000000000000 [21438064.167499] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000651c18 [21438064.176459] R13: 000000c000674ab0 R14: 000000c000247a40 R15: 00000000000c54f4 [21438064.185413] FS: 000000c000180098 GS: 0000000000000000 [21438235.776629] potentially unexpected fatal signal 11. [21438235.781942] CPU: 28 PID: 826989 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438235.793947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438235.803557] RIP: 0033:0x55ea73e76a80 [21438235.807513] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21438235.826690] RSP: 002b:00007ff5164cc440 EFLAGS: 00010246 [21438235.832298] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055ea73e76e0d [21438235.839854] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055ea74ad8760 [21438235.847410] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21438235.854981] R10: 000055ea74ad8750 R11: 0000000000000246 R12: 0000000000000000 [21438235.862521] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21438235.870049] FS: 000055ea74ad8480 GS: 0000000000000000 [21438263.019582] exe[829702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638742caab9 cs:33 sp:7fc5dea3def8 ax:0 si:20000b40 di:ffffffffff600000 [21438278.626485] exe[814739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563296cf2237 cs:33 sp:7f498b4dcef8 ax:2f700000 si:563296d602f7 di:ffffffffff600000 [21439959.504740] potentially unexpected fatal signal 5. [21439959.510003] CPU: 9 PID: 895163 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21439959.521896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21439959.531652] RIP: 0033:0x7fffffffe062 [21439959.535674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21439959.554911] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21439959.561887] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21439959.570830] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21439959.579751] RBP: 000000c00076bc80 R08: 0000000000000000 R09: 0000000000000000 [21439959.588666] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00076bc70 [21439959.597592] R13: 000000c00077a000 R14: 000000c0004b1a40 R15: 00000000000c265c [21439959.606512] FS: 000000c00013a898 GS: 0000000000000000 [21440506.641205] exe[906202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ced093cab9 cs:33 sp:7f1024cb1858 ax:0 si:55ced0996097 di:ffffffffff600000 [21440929.410111] exe[906118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614939eeab9 cs:33 sp:7fa270ede858 ax:0 si:561493a48062 di:ffffffffff600000 [21441741.040609] exe[899030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559abe6b7ab9 cs:33 sp:7f9d2831f858 ax:0 si:559abe711070 di:ffffffffff600000 [21441801.531426] exe[930335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464edd8ab9 cs:33 sp:7ed6db245858 ax:0 si:56464ee32070 di:ffffffffff600000 [21441867.132921] exe[900006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563005357237 cs:33 sp:7efe11ca1ef8 ax:2f700000 si:5630053c52f7 di:ffffffffff600000 [21441924.439739] exe[900681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3097 di:ffffffffff600000 [21441968.182112] exe[918729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3070 di:ffffffffff600000 [21442141.932482] exe[941550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88c533ab9 cs:33 sp:7ff4c3bbaef8 ax:0 si:20000b40 di:ffffffffff600000 [21442183.243140] potentially unexpected fatal signal 5. [21442183.248371] CPU: 5 PID: 897702 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21442183.260256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21442183.269983] RIP: 0033:0x7fffffffe062 [21442183.274069] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21442183.294644] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21442183.301673] RAX: 0000562103400000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21442183.310620] RDX: 0000000000000001 RSI: 00000000000c6000 RDI: 0000562103400000 [21442183.319535] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000015e6a000 [21442183.328477] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21442183.337423] R13: 0000000002883b00 R14: 000000c000261340 R15: 00000000000d83f2 [21442183.346355] FS: 00000000056d63c0 GS: 0000000000000000 [21442276.464039] exe[937687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563deeb82237 cs:33 sp:7ff3e3626ef8 ax:2f700000 si:563deebf02f7 di:ffffffffff600000 [21443247.854800] potentially unexpected fatal signal 5. [21443247.860022] CPU: 87 PID: 960703 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21443247.872037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21443247.881703] RIP: 0033:0x7fffffffe062 [21443247.885749] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21443247.905003] RSP: 002b:000000c0005ddb90 EFLAGS: 00000297 [21443247.912026] RAX: 000055d4a3ddc000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21443247.920977] RDX: 0000000000000005 RSI: 00000000000a3000 RDI: 000055d4a3ddc000 [21443247.929945] RBP: 000000c0005ddc28 R08: 000000000000001d R09: 0000000000025000 [21443247.938889] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005ddc18 [21443247.947861] R13: 000000c000604ab0 R14: 000000c0001a2540 R15: 00000000000ea2f8 [21443247.956837] FS: 000000c0004c4098 GS: 0000000000000000 [21443319.546280] exe[963762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a272b05ab9 cs:33 sp:7f70190fc858 ax:0 si:55a272b5f062 di:ffffffffff600000 [21443590.793684] exe[940494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df4e07ab9 cs:33 sp:7f98ef5c2858 ax:0 si:559df4e61062 di:ffffffffff600000 [21443590.892110] exe[938734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443590.928779] exe[950791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443744.166654] exe[837833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f75f9fab9 cs:33 sp:7efe9862d858 ax:0 si:563f75ff9062 di:ffffffffff600000 [21444759.685018] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.788450] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.871641] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.957795] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.027836] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.102763] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.180507] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.254623] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.339473] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.439215] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.745687] warn_bad_vsyscall: 119 callbacks suppressed [21444764.745691] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.829242] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.880001] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.930499] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.033109] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.161342] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.227547] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.290090] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.366607] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.437303] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.771003] warn_bad_vsyscall: 162 callbacks suppressed [21444769.771007] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfae7858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.831043] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.989792] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.155493] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.176230] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.373775] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.452276] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.571678] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.662426] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.705979] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444774.839250] warn_bad_vsyscall: 22 callbacks suppressed [21444774.839254] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444774.917700] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.007565] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.103870] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.180498] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.250561] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.325031] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.351860] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfac6858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.446972] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.534307] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.140380] warn_bad_vsyscall: 72 callbacks suppressed [21444780.140384] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.643337] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.947124] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444784.632292] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444785.386823] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444792.865757] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444793.551179] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444794.857777] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444795.272022] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444796.751398] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444800.120920] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444801.450170] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444804.767331] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444805.633435] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.772372] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.921237] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444811.297593] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444812.146654] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444813.508582] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444814.929121] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444819.248469] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444824.585881] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444827.871681] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444832.360581] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444834.925364] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.288823] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.720001] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444841.688511] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.617356] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.690034] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444851.187230] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444853.140443] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444854.978943] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444855.997434] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.846154] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.956772] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444865.048334] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444867.699730] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444870.008061] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444874.057095] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444874.584649] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444878.150838] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.187996] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.592827] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861070 di:ffffffffff600000 [21444888.747586] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444890.457520] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444891.294252] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444893.971964] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444896.397298] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444902.556293] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444904.197522] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.677291] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.784817] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444906.703025] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444917.894799] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444928.650542] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444937.061576] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444939.873384] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444943.278042] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444950.506046] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444956.631679] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444958.608427] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444965.379337] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444966.588096] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444971.015726] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444972.464198] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444978.505399] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444982.026980] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444983.360867] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444986.978698] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444992.675657] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.165519] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.503074] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444998.928894] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.399798] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.661551] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531097 di:ffffffffff600000 [21445015.325564] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445017.454777] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445019.945854] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445025.910525] exe[957023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.083519] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.301379] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.365566] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.559238] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445046.974609] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531070 di:ffffffffff600000 [21445047.901825] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445052.095269] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445054.571345] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445060.673513] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445068.266639] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.231625] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.779294] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.831508] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445079.233360] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b097 di:ffffffffff600000 [21445081.128574] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.161127] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.914812] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445086.016119] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445090.878336] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445097.681485] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445102.543209] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445104.966329] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445110.226832] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445114.088409] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445116.798978] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff38898c858 ax:0 si:563a810da062 di:ffffffffff600000 [21445118.746297] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445126.363396] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebb3858 ax:0 si:555673e01062 di:ffffffffff600000 [21445129.789237] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.298837] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.946721] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445136.356780] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445140.476028] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55853a7f6ab9 cs:33 sp:7fe4f74ca858 ax:0 si:55853a850062 di:ffffffffff600000 [21445144.730796] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611d5740ab9 cs:33 sp:7ff45e779858 ax:0 si:5611d579a070 di:ffffffffff600000 [21445148.028348] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445148.790663] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445152.325550] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445154.790652] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445156.052088] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445157.741556] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.391485] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.739901] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445161.428544] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445173.223042] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445173.594048] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445178.199774] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc845dfe858 ax:0 si:556c04023062 di:ffffffffff600000 [21445181.218769] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445183.023651] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445184.355158] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445188.022808] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445189.127364] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445192.258056] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445193.061695] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445197.889603] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445200.301619] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445202.763703] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445207.380242] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023097 di:ffffffffff600000 [21445212.537971] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445220.899130] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445224.604790] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445226.330275] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445229.587615] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.145301] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.916690] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445238.332376] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445240.003174] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445244.800071] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445252.622244] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445252.839739] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.156479] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.344846] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.710821] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.770559] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445260.357515] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445261.260396] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445262.268465] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445265.664065] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445267.031408] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445270.603396] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445280.492226] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445291.428186] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.706553] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.761657] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6097 di:ffffffffff600000 [21445293.297774] potentially unexpected fatal signal 5. [21445293.303025] CPU: 45 PID: 980394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21445293.315033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21445293.324690] RIP: 0033:0x7fffffffe062 [21445293.328690] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21445293.347937] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [21445293.354945] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21445293.362524] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21445293.371428] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [21445293.380368] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00002bc18 [21445293.389391] R13: 000000c000331f20 R14: 000000c0004a5880 R15: 00000000000e3608 [21445293.398275] FS: 000000c00047e098 GS: 0000000000000000 [21445298.698236] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445312.450965] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445319.934972] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445320.623469] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445322.344040] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445322.851138] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445324.902121] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445326.332009] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445329.060107] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445332.696951] exe[5993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445332.778180] exe[8270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445333.380151] exe[9095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445334.730615] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445335.552590] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445341.447239] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445352.481836] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445373.333280] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445374.513228] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445375.420796] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12070 di:ffffffffff600000 [21445377.734758] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445383.851003] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445384.291148] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.485928] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.637748] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445392.972332] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445401.691244] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445403.610793] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445408.086576] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.296386] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.390719] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.637394] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445414.276789] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51741858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445416.954944] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445420.283379] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040070 di:ffffffffff600000 [21445421.888092] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445425.103348] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.478434] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.915067] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445440.279176] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445444.426181] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445445.430466] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445446.103854] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445449.378881] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445452.324233] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.152912] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.506655] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445454.531178] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445456.649265] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.405107] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.747278] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445463.497766] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec532858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445465.932667] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445468.014560] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.357804] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.824410] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445474.191417] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445474.690410] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445475.419937] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445480.449668] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e3809dab9 cs:33 sp:7f21ee779858 ax:0 si:563e380f7062 di:ffffffffff600000 [21445489.626684] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.471870] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.957406] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445493.670957] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce84a3ab9 cs:33 sp:7f15a998f858 ax:0 si:55fce84fd062 di:ffffffffff600000 [21445510.318045] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445510.530251] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445513.575315] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445515.944344] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.114859] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.227701] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.417928] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.896972] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.240395] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.289894] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.739748] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445524.601943] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445526.765728] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445528.840735] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445531.101086] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445534.919354] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445537.911447] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445540.810846] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445547.137370] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445548.456107] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445550.616270] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445555.719420] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445557.608202] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445571.989529] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.730693] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.782182] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.380165] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.976456] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445575.440647] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445577.076717] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445577.124137] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445578.944960] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445586.631588] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445592.262472] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445606.583570] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445611.591671] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445615.962245] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445616.622804] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445621.256455] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445627.369382] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445629.884683] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445633.085867] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7aa858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445634.161560] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445638.196216] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445640.718018] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445641.234792] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445646.716123] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.320269] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.968227] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445650.701018] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445651.990887] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445652.569758] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445654.950020] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445656.099429] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445657.461786] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445666.423388] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445668.641084] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445670.229840] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445676.931016] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445677.071672] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445692.131653] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445700.127714] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445706.043938] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445715.492611] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.617799] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.905056] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445719.125360] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24097 di:ffffffffff600000 [21445723.226831] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445724.327624] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445727.014260] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445727.334147] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445730.242432] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445736.359701] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445742.212894] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445749.894875] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.063639] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.548472] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445752.071678] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445753.696048] exe[992339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4d1eab9 cs:33 sp:7f7aef1c5858 ax:0 si:5612b4d78070 di:ffffffffff600000 [21445753.851474] exe[993503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cd4b40ab9 cs:33 sp:7fdc5e3a8858 ax:0 si:562cd4b9a070 di:ffffffffff600000 [21445753.968181] exe[993657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.005129] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.037758] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.069914] exe[993483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445764.549150] warn_bad_vsyscall: 53 callbacks suppressed [21445764.549153] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445764.992101] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445769.355907] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445769.686753] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445771.956228] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445774.717978] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445783.613648] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445784.559157] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445789.453117] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445789.682993] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445790.389406] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445792.681618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.019841] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.676499] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445799.488275] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445800.893573] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445802.821225] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.400839] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.492549] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445809.911687] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.190618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.252565] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445820.215245] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445822.755904] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445837.243941] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.601113] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.772389] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445849.364312] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445866.630843] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.189417] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.326705] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445875.619873] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445877.437862] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445891.892716] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445894.632615] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445903.139034] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445907.349482] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445912.966079] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445915.390092] exe[975041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559287e71ab9 cs:33 sp:7ebefdb8bef8 ax:0 si:20000040 di:ffffffffff600000 [21445923.564337] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445923.621637] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445928.760191] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445935.813587] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445943.472902] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445957.613048] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445958.348242] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445965.673905] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445968.011572] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445969.194893] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445981.004158] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445984.446826] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445987.354963] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.430634] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.588337] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445988.275306] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445991.227962] exe[14505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4fc9d6237 cs:33 sp:7fb3db97def8 ax:2f700000 si:55c4fca442f7 di:ffffffffff600000 [21445994.428433] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445998.827036] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445998.942082] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445999.493291] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446005.631028] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446010.118455] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446011.395855] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446012.112688] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446013.771033] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446016.685515] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.026346] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.628704] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446025.547663] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446030.896060] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446034.115619] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446039.988186] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446052.045116] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446055.957256] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446056.492658] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446059.232830] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446069.887004] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446073.301104] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.145896] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.310813] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446080.736650] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446083.229851] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446088.237648] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446091.879414] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446095.729502] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446098.522121] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446099.516786] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8a3858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446197.718660] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446198.511944] exe[966039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db9991cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a0040000 [21446208.726128] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.516308] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.986750] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446217.271828] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a097 di:ffffffffff600000 [21446221.418781] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446231.747967] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446244.735122] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446251.091003] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446253.795886] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446257.619944] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e097 di:ffffffffff600000 [21446259.808765] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446260.287816] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446272.305879] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446273.451184] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446274.196385] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446277.660781] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446279.499654] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446285.029421] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446287.214019] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446289.786912] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446298.503266] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446300.730450] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446304.124472] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446328.652395] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446333.672163] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec097 di:ffffffffff600000 [21446339.050167] exe[959405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446342.754732] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4f37fab9 cs:33 sp:7f1711f86858 ax:0 si:557b4f3d9062 di:ffffffffff600000 [21446355.441686] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9b1b3ab9 cs:33 sp:7fb4600fa858 ax:0 si:555d9b20d062 di:ffffffffff600000 [21446356.801248] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446358.879935] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446359.683149] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446365.884476] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446366.050240] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.847894] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.922860] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446379.074947] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446385.962092] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446386.184050] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446386.806333] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446387.425707] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446391.344316] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446394.619546] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446400.789725] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446400.842952] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446406.750719] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446410.385036] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446412.205864] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446413.935473] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446418.015251] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446983.840910] exe[24076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f4bb16ab9 cs:33 sp:7edc3ced7ef8 ax:0 si:200001c0 di:ffffffffff600000 [21447481.641149] exe[26590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d12723ab9 cs:33 sp:7ede07fc7858 ax:0 si:559d1277d062 di:ffffffffff600000 [21447487.779471] exe[49042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f84acbab9 cs:33 sp:7eeb669df858 ax:0 si:561f84b25062 di:ffffffffff600000 [21447556.264537] exe[45380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f79d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447556.362445] exe[45479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dcf10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447804.810843] exe[68090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447804.908178] exe[45023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447804.987976] exe[49166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.031762] exe[68288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559215d3eab9 cs:33 sp:7f62094e1858 ax:0 si:559215d98097 di:ffffffffff600000 [21447805.139075] exe[33136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447805.242166] exe[68364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.405505] exe[49083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef086aab9 cs:33 sp:7f715c98b858 ax:0 si:557ef08c4097 di:ffffffffff600000 [21447805.540221] exe[68285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39062 di:ffffffffff600000 [21447990.996286] exe[70744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577b0cd6ab9 cs:33 sp:7f6919eb6ef8 ax:0 si:20002340 di:ffffffffff600000 [21447991.363192] exe[75684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632a65afab9 cs:33 sp:7f2e591feef8 ax:0 si:20002340 di:ffffffffff600000 [21448041.536408] potentially unexpected fatal signal 5. [21448041.541641] CPU: 30 PID: 80640 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.553580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.563252] RIP: 0033:0x7fffffffe062 [21448041.567286] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448041.575629] potentially unexpected fatal signal 11. [21448041.587913] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21448041.593211] CPU: 78 PID: 75653 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.593212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.593215] RIP: 0033:0x5606400ce6ac [21448041.593218] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21448041.593219] RSP: 002b:00007f5d26bdb308 EFLAGS: 00010206 [21448041.598836] RAX: 00007f9498215000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448041.598837] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f9498215000 [21448041.598837] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000041fe000 [21448041.598838] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21448041.598839] R13: 000000c000178808 R14: 000000c0004b3c00 R15: 0000000000012055 [21448041.598840] FS: 00007f3143fff6c0 GS: 0000000000000000 [21448041.699881] RAX: 0000000020000300 RBX: 00007f5d26bdb418 RCX: 00007f3680a00000 [21448041.707437] RDX: 0000000000000013 RSI: 00007f3680a00020 RDI: 0000000020000300 [21448041.716339] RBP: 0000000000000001 R08: 00007f3680e00000 R09: 0000000000000188 [21448041.725263] R10: 00ab72794e84070c R11: 00000000861c4a91 R12: 00007f3680a00000 [21448041.734185] R13: fffffffffffffffe R14: 00007f3680a00000 R15: 00007f3680a00008 [21448041.743104] FS: 0000560640d4c480 GS: 0000000000000000 [21448079.551197] potentially unexpected fatal signal 11. [21448079.556536] CPU: 47 PID: 73160 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448079.568434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448079.578070] RIP: 0033:0x5600822ab939 [21448079.582041] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21448079.601255] RSP: 002b:00007f3f8af82440 EFLAGS: 00010206 [21448079.606944] RAX: 0000000000000147 RBX: 0000000000000000 RCX: 00005600822abdd3 [21448079.615934] RDX: 0000000000000147 RSI: 0000000000000000 RDI: 0000000001200011 [21448079.624897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21448079.633843] R10: 0000560082f0d750 R11: 0000000000000246 R12: 0000000000000147 [21448079.642755] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21448079.651670] FS: 0000560082f0d480 GS: 0000000000000000 [21448142.862707] exe[53476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c40d0ab9 cs:33 sp:7ecedf1feef8 ax:0 si:20002340 di:ffffffffff600000 [21448149.802562] exe[53561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93eba7ab9 cs:33 sp:7ed727fdbef8 ax:0 si:20002340 di:ffffffffff600000 [21448203.817495] exe[83585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641788daab9 cs:33 sp:7fee94d66ef8 ax:0 si:20001180 di:ffffffffff600000 [21448232.473098] exe[83465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eebc403ab9 cs:33 sp:7f0aab8ccef8 ax:0 si:20002340 di:ffffffffff600000 [21448233.545483] exe[14014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556199d11ab9 cs:33 sp:7f3034bfeef8 ax:0 si:20002340 di:ffffffffff600000 [21448235.446700] exe[60971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f446bbab9 cs:33 sp:7fd8a5b84ef8 ax:0 si:20002340 di:ffffffffff600000 [21448251.754946] exe[90183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd70d33ab9 cs:33 sp:7efca399fef8 ax:0 si:20002340 di:ffffffffff600000 [21448294.917060] exe[92485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55918d21eab9 cs:33 sp:7f4b894f0ef8 ax:0 si:20002340 di:ffffffffff600000 [21448345.356696] exe[95188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ad39ab9 cs:33 sp:7eb9532dfef8 ax:0 si:20002340 di:ffffffffff600000 [21448423.166017] exe[91824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a6aca9ab9 cs:33 sp:7ff63595eef8 ax:0 si:20002240 di:ffffffffff600000 [21448546.744563] exe[100705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56404ab50ab9 cs:33 sp:7f661bfd6ef8 ax:0 si:20002340 di:ffffffffff600000 [21448911.587611] potentially unexpected fatal signal 5. [21448911.592838] CPU: 31 PID: 60810 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.604726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.614333] RIP: 0033:0x7fffffffe062 [21448911.618295] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.637514] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.643205] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448911.650749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21448911.659687] RBP: 000000c000553c28 R08: 0000000000000000 R09: 0000000000000000 [21448911.668905] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000553c18 [21448911.677807] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448911.686745] FS: 000000c000180898 GS: 0000000000000000 [21448911.940149] potentially unexpected fatal signal 5. [21448911.945383] CPU: 14 PID: 8130 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.957209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.966899] RIP: 0033:0x7fffffffe062 [21448911.970882] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.990092] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.997126] RAX: 000000000001b4db RBX: 0000000000000000 RCX: 00007fffffffe05a [21448912.004698] RDX: 0000000000000000 RSI: 000000c000554000 RDI: 0000000000012f00 [21448912.013644] RBP: 000000c000553c28 R08: 000000c00055a2e0 R09: 0000000000000000 [21448912.022578] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000553c18 [21448912.031546] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448912.040482] FS: 000000c000180898 GS: 0000000000000000 [21448943.731044] exe[108824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4dd463ab9 cs:33 sp:7f30d2c83ef8 ax:0 si:20002340 di:ffffffffff600000 [21449044.520442] exe[105882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588eef65ab9 cs:33 sp:7f2ed2105858 ax:0 si:5588eefbf070 di:ffffffffff600000 [21449053.615099] exe[991268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556623419ab9 cs:33 sp:7fb739ce3ef8 ax:0 si:20002340 di:ffffffffff600000 [21449317.532790] exe[81936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.685224] exe[84190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562336f9ab9 cs:33 sp:7fac431a6858 ax:0 si:556233753097 di:ffffffffff600000 [21449317.698966] exe[82785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.813087] exe[105113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.929349] exe[82442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e097 di:ffffffffff600000 [21449318.092061] exe[105091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449318.210423] exe[104422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e062 di:ffffffffff600000 [21449585.710504] exe[124975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5a89bdab9 cs:33 sp:7eefae34def8 ax:0 si:20002340 di:ffffffffff600000 [21449797.733840] exe[89795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560127b8cab9 cs:33 sp:7fc40b790ef8 ax:0 si:20000800 di:ffffffffff600000 [21450018.251903] exe[108224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f1ff64ab9 cs:33 sp:7ed7af6daef8 ax:0 si:20002280 di:ffffffffff600000 [21450160.422392] exe[39838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370d369ab9 cs:33 sp:7f40c7a57ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.589605] exe[131437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.622086] exe[76745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450421.448398] exe[108372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450421.957225] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450451.773435] exe[139817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2ed15ab9 cs:33 sp:7f226d987858 ax:0 si:562f2ed6f062 di:ffffffffff600000 [21450548.798590] exe[146816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562463594ab9 cs:33 sp:7f9a1a163858 ax:0 si:5624635ee062 di:ffffffffff600000 [21450846.563279] exe[99118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c8f1e6ab9 cs:33 sp:7eabe5a8a858 ax:0 si:556c8f240062 di:ffffffffff600000 [21451174.354726] exe[81661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561500b1aab9 cs:33 sp:7f7dfeffe858 ax:0 si:561500b74062 di:ffffffffff600000 [21451174.512873] exe[100407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eedd21ab9 cs:33 sp:7ff14e304858 ax:0 si:564eedd7b062 di:ffffffffff600000 [21451345.299799] exe[108469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.720121] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.759670] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.795169] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.834305] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.870415] exe[113009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.907890] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.946869] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.982038] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451346.014160] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451427.289290] potentially unexpected fatal signal 11. [21451427.294633] CPU: 0 PID: 145474 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451427.306524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451427.316334] RIP: 0033:0x55ec2eec51ef [21451427.320381] Code: 00 00 00 e9 33 0c 05 00 0f 1f 00 e9 3b f8 ff ff 0f 1f 00 81 fa 00 01 00 00 74 d6 8b 57 10 83 e2 7f 83 fa 01 0f 85 92 00 00 00 <64> 8b 04 25 d0 02 00 00 39 47 08 75 30 8b 47 04 83 f8 ff 0f 84 bc [21451427.339701] RSP: 002b:00007f2b6c89f150 EFLAGS: 00010246 [21451427.346663] RAX: 0000000000000000 RBX: 000055ec2fb4e7f0 RCX: 000055ec2fb4e7d0 [21451427.355626] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000055ec2eff0f20 [21451427.364542] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [21451427.373512] R10: 0000000000021000 R11: 0000000000000010 R12: 00007f2b6c89f470 [21451427.382414] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [21451427.391351] FS: 000055ec2fb4d480 GS: 0000000000000000 [21451450.941030] warn_bad_vsyscall: 13 callbacks suppressed [21451450.941034] exe[82819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6ee0b1ab9 cs:33 sp:7fe40077b858 ax:0 si:55c6ee10b062 di:ffffffffff600000 [21451451.080867] exe[82424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5fda91ab9 cs:33 sp:7fd5c4e34858 ax:0 si:55f5fdaeb062 di:ffffffffff600000 [21451723.104775] potentially unexpected fatal signal 5. [21451723.110064] CPU: 8 PID: 140157 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451723.121970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451723.131602] RIP: 0033:0x7fffffffe062 [21451723.135590] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21451723.154816] RSP: 002b:000000c00051fb90 EFLAGS: 00000297 [21451723.160495] RAX: 0000560022cbb000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21451723.169428] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000560022cbb000 [21451723.178408] RBP: 000000c00051fc28 R08: 0000000000000009 R09: 000000000eeca000 [21451723.187327] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00051fc18 [21451723.196328] R13: 000000c0006c0150 R14: 000000c000172c40 R15: 0000000000021e97 [21451723.205247] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452267.679193] potentially unexpected fatal signal 5. [21452267.684431] CPU: 53 PID: 197184 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452267.696403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452267.706032] RIP: 0033:0x7fffffffe062 [21452267.710009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452267.729271] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21452267.736273] RAX: 000055b277603000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452267.745215] RDX: 0000000000000003 RSI: 00000000000b9000 RDI: 000055b277603000 [21452267.754131] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000017846000 [21452267.763057] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21452267.771985] R13: 000000c000143008 R14: 000000c0001fe8c0 R15: 000000000002fa54 [21452267.780900] FS: 00007f159a19e6c0 GS: 0000000000000000 [21452468.159193] potentially unexpected fatal signal 5. [21452468.164418] CPU: 19 PID: 165360 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452468.176405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452468.186044] RIP: 0033:0x7fffffffe062 [21452468.190016] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452468.209398] RSP: 002b:000000c0005cfb90 EFLAGS: 00000297 [21452468.216341] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452468.225292] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452468.234229] RBP: 000000c0005cfc28 R08: 0000000000000000 R09: 0000000000000000 [21452468.242055] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005cfc18 [21452468.250978] R13: 000000c0005d8b10 R14: 000000c000168700 R15: 00000000000283f3 [21452468.259957] FS: 000000c00013b098 GS: 0000000000000000 [21452478.300026] potentially unexpected fatal signal 5. [21452478.305253] CPU: 73 PID: 173701 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452478.317255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452478.326943] RIP: 0033:0x7fffffffe062 [21452478.330964] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452478.351551] RSP: 002b:000000c000645b90 EFLAGS: 00000297 [21452478.358565] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452478.367466] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452478.375003] RBP: 000000c000645c28 R08: 0000000000000000 R09: 0000000000000000 [21452478.383965] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000645c18 [21452478.392937] R13: 000000c000574990 R14: 000000c000518700 R15: 0000000000029ee5 [21452478.401850] FS: 000000c00013a898 GS: 0000000000000000 [21452549.148066] potentially unexpected fatal signal 5. [21452549.153287] CPU: 64 PID: 208050 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452549.165256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452549.174896] RIP: 0033:0x7fffffffe062 [21452549.178893] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452549.198078] RSP: 002b:000000c00063fb90 EFLAGS: 00000297 [21452549.203724] RAX: 000056450fe79000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452549.211325] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 000056450fe79000 [21452549.220243] RBP: 000000c00063fc28 R08: 0000000000000009 R09: 000000001d314000 [21452549.229221] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00063fc18 [21452549.238149] R13: 000000c00016e6f0 R14: 000000c00046d6c0 R15: 0000000000032589 [21452549.247061] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452921.656857] exe[175762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1a22ab9 cs:33 sp:7f9102aefef8 ax:0 si:200020c0 di:ffffffffff600000 [21453766.501683] potentially unexpected fatal signal 5. [21453766.506906] CPU: 1 PID: 234052 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21453766.518797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21453766.528439] RIP: 0033:0x7fffffffe062 [21453766.532443] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21453766.551630] RSP: 002b:000000c000635b90 EFLAGS: 00000297 [21453766.557247] RAX: 00007f09bd033000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21453766.566174] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f09bd033000 [21453766.575123] RBP: 000000c000635c28 R08: 0000000000000009 R09: 000000000ba82000 [21453766.584046] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000635c18 [21453766.592970] R13: 000000c00063df50 R14: 000000c000528a80 R15: 0000000000038d89 [21453766.601914] FS: 000000c00013a898 GS: 0000000000000000 [21453885.538095] exe[193302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c141e4bab9 cs:33 sp:7f4bc67b1858 ax:0 si:55c141ea5062 di:ffffffffff600000 [21453926.740056] exe[244983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55782ab5dab9 cs:33 sp:7f911c7cf858 ax:0 si:55782abb7062 di:ffffffffff600000 [21453926.878261] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ee858 ax:0 si:563261096062 di:ffffffffff600000 [21453926.920773] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ac858 ax:0 si:563261096062 di:ffffffffff600000 [21454125.554702] exe[252512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019188c237 cs:33 sp:7f044616aef8 ax:2f700000 si:5601918fa2f7 di:ffffffffff600000 [21454289.936490] exe[254568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fe7a1ab9 cs:33 sp:7f99d7e41858 ax:0 si:5624fe7fb062 di:ffffffffff600000 [21454421.038312] exe[185490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9cbdcab9 cs:33 sp:7ed17925b858 ax:0 si:55eb9cc36062 di:ffffffffff600000 [21454524.053375] exe[260691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454524.226734] exe[260197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.339878] exe[260304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.433650] exe[261887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.438807] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.707563] exe[260673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.877490] exe[260394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.989904] exe[260311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1afb64ab9 cs:33 sp:7f1987fb4858 ax:0 si:55e1afbbe062 di:ffffffffff600000 [21454525.106822] exe[260718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454527.268639] exe[260316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454672.580477] warn_bad_vsyscall: 1 callbacks suppressed [21454672.580486] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.671718] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.773413] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.870160] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.984607] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.093042] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.343804] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.502958] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.623689] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.945005] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.622286] warn_bad_vsyscall: 38 callbacks suppressed [21454677.622289] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.649306] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.797837] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.924303] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.033247] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.147541] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.243578] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.365198] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.366559] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.734316] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454682.725313] warn_bad_vsyscall: 110 callbacks suppressed [21454682.725318] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454682.854399] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.340519] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.468246] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.597270] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.704896] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.854189] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.965811] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454684.065528] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454684.142715] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.786376] warn_bad_vsyscall: 41 callbacks suppressed [21454687.786380] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.878404] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454687.964450] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454688.059011] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.139467] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.258420] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.372343] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.462994] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.603797] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.629959] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.814259] warn_bad_vsyscall: 101 callbacks suppressed [21454692.814263] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.982278] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.075832] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.186846] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.289633] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.315779] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.432820] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.554328] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.555912] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbaa858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.662706] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454703.286388] warn_bad_vsyscall: 65 callbacks suppressed [21454703.286392] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454714.254956] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454720.956406] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454723.784515] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454729.460866] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.533072] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.950996] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454740.815666] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.353885] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.865771] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454748.197216] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454750.830160] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454753.204914] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454753.453123] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454760.155279] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320097 di:ffffffffff600000 [21454761.088939] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454762.176865] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454766.253097] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454770.056364] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454775.976498] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454784.363973] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454791.081015] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454795.338769] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.152832] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.835586] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.853774] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.912408] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.283261] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.407491] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454805.714772] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454816.461537] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454821.067549] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454825.301874] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454838.800653] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454839.522411] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454853.269546] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454856.821693] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454857.163577] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.154674] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.258545] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454869.435932] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454870.431232] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454880.007912] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454888.879181] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454890.119239] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454891.913923] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454892.878024] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454897.149573] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454899.451558] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454903.522908] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454908.436793] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454909.546162] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454915.414130] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454920.724451] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454922.263618] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454925.150933] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454931.595224] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454935.444256] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454937.335030] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454938.062634] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454938.253807] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454939.094683] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454945.980467] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454947.685408] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454955.929818] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588062 di:ffffffffff600000 [21454957.106591] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588097 di:ffffffffff600000 [21454961.440587] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.555639] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.733943] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4097 di:ffffffffff600000 [21454975.626983] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454978.283843] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.415851] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.894727] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454986.182028] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21454987.023053] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454989.684589] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454991.165438] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454997.033758] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455000.415990] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455002.358861] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455013.494354] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.602736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.729393] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455035.204155] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455036.456375] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455038.102573] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455046.099565] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455051.117778] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa070 di:ffffffffff600000 [21455054.756211] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455058.958891] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455060.631627] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455063.652702] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455067.052887] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455068.605314] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455070.486133] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455071.601968] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455071.666713] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455082.985936] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455083.589062] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455087.903179] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455090.783586] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455099.350284] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455102.124766] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455115.361282] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455118.778260] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455119.585109] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455120.744777] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455124.502346] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455127.077113] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455129.774803] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455134.524468] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455137.241007] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455151.651115] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455152.253216] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455153.366354] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455155.229796] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2070 di:ffffffffff600000 [21455158.687434] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455161.507899] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455165.032147] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455167.184284] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.099538] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.401736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455169.634895] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455179.867172] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455193.872123] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455201.622707] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455203.960413] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455214.821327] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455215.163111] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455219.403074] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455225.110631] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455231.821414] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455233.587400] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455244.997718] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.320983] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.379397] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.230669] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.518412] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.935542] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455274.465274] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455276.626872] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455277.282208] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455279.595154] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455280.145748] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455286.229144] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455290.507873] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455291.778256] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455293.176860] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455303.307164] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.363844] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.682574] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455307.275079] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455309.241817] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dc059cab9 cs:33 sp:7f782e79a858 ax:0 si:562dc05f6062 di:ffffffffff600000 [21455311.129886] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455322.860148] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c097 di:ffffffffff600000 [21455332.589722] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455332.700931] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455334.339658] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455337.645000] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455339.687680] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455347.975800] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455353.540316] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455361.261161] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455364.920682] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455367.889612] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455369.798717] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455380.530402] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455383.340410] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455386.700812] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455388.035247] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.502494] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.846054] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455393.899065] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455397.882514] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455398.304499] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455399.487090] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455400.015083] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455401.175928] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455402.510494] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.104031] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.456675] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455409.959752] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455411.741970] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455420.695502] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455420.886275] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455421.977215] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455422.480950] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455424.616833] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455426.514731] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455427.906277] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455428.885023] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455429.688117] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455430.181407] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.620573] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.887496] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455436.831722] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455440.163203] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455444.356958] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e070 di:ffffffffff600000 [21455447.715063] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455451.872533] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455453.367796] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455456.529530] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455458.269051] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455458.907214] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455464.483039] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455471.610323] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455479.155044] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455482.641860] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455484.878898] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455489.117478] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587f5f5cab9 cs:33 sp:7fb178cf3858 ax:0 si:5587f5fb6062 di:ffffffffff600000 [21455494.241499] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455500.248834] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455501.843485] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455502.688126] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455508.247012] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455508.378730] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455512.119932] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455513.946981] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455518.676302] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455519.224262] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455536.874916] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455538.183411] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199070 di:ffffffffff600000 [21455540.907737] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455554.070102] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455556.597971] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455566.166792] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.356169] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.741223] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455569.553311] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455572.950611] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399097 di:ffffffffff600000 [21455574.231556] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455577.045483] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.011335] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.324463] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455586.419520] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455599.164433] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455599.663806] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455600.370593] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455601.617755] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455602.568034] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455603.932952] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf097 di:ffffffffff600000 [21455611.900772] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455613.037794] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455624.475093] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455625.938343] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455626.770998] exe[262790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eca2a2ab9 cs:33 sp:7f94696b4ef8 ax:0 si:20000140 di:ffffffffff600000 [21455626.909133] exe[236204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c15b8f2ab9 cs:33 sp:7f7908ba0ef8 ax:0 si:20000140 di:ffffffffff600000 [21455627.685288] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455630.058756] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455630.102857] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557097 di:ffffffffff600000 [21455631.690925] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455631.839303] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455634.586555] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455636.119592] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455638.399557] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455640.161047] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455641.979261] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455642.611888] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455643.231970] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455644.065895] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455650.578375] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455655.559316] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.102114] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.549752] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455662.275653] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455666.501867] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455667.977274] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455674.753406] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455676.371178] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455685.906028] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455693.267970] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455696.630499] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455701.477095] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d097 di:ffffffffff600000 [21455709.992418] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455711.360715] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455712.164761] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455713.490919] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455714.065206] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455721.056465] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455725.704028] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455727.826709] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.520361] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.880799] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455739.712038] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455740.658732] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455742.184305] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455749.813084] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455753.426205] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455760.077282] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455761.980566] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455762.980724] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455765.412714] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.605899] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.794929] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455768.810620] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455777.444820] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6097 di:ffffffffff600000 [21455777.567378] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455782.478847] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455788.240306] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ce5bb7ab9 cs:33 sp:7fb59ad64858 ax:0 si:558ce5c11062 di:ffffffffff600000 [21455805.186522] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455807.413415] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455813.042457] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202097 di:ffffffffff600000 [21455815.027260] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455817.074043] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.606700] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.882974] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455825.572639] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c8f10ab9 cs:33 sp:7f5fd4c6b858 ax:0 si:55f3c8f6a062 di:ffffffffff600000 [21455834.668963] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515df14ab9 cs:33 sp:7f2c3b52f858 ax:0 si:56515df6e062 di:ffffffffff600000 [21455850.728499] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455851.441178] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455854.377874] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455862.232590] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455865.672576] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455869.961062] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455870.133984] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455870.240747] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455871.369073] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455879.085834] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455881.447717] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21456118.721770] potentially unexpected fatal signal 11. [21456118.727094] CPU: 30 PID: 280467 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21456118.739098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21456118.748734] RIP: 0033:0x55d7c59cee48 [21456118.752705] Code: 8b 54 15 10 48 39 15 d7 e8 c4 00 0f 82 c6 01 00 00 4c 8b 80 78 04 00 00 49 39 d6 48 8b 0c 24 4c 0f 42 f2 48 8b b0 70 04 00 00 <66> 0f 6f 05 20 81 06 00 4c 89 c2 48 c1 e2 04 4c 8d 5e 01 48 01 ca [21456118.771891] RSP: 002b:00007f8aed372170 EFLAGS: 00010246 [21456118.777557] RAX: 000055d7c5ac80c0 RBX: 000055d7c66257f0 RCX: 000055d7c66257f0 [21456118.785112] RDX: 0000000000000000 RSI: 0000000000000148 RDI: 0000000000000001 [21456118.794059] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [21456118.803014] R10: 0000000000021000 R11: 0000000000000010 R12: 0000000000000001 [21456118.811941] R13: 000055d7c661db60 R14: 0000000000000000 R15: 0000000000000001 [21456118.820883] FS: 000055d7c6624480 GS: 0000000000000000 [21456368.022678] exe[292956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868026ab9 cs:33 sp:7f2b44340858 ax:0 si:556868080062 di:ffffffffff600000 [21456494.905253] exe[289384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456495.370778] exe[289369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456495.418194] exe[262400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.608351] exe[290038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.800773] exe[298034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456498.466626] exe[272159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456499.006290] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.143136] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.333939] exe[298563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456503.638016] exe[262196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456503.883772] exe[276612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f35d858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.112958] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.340089] exe[289392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.539187] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.759838] exe[265386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456504.978607] exe[272995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456505.261093] exe[262943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456508.402863] warn_bad_vsyscall: 6 callbacks suppressed [21456508.402867] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.537669] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.546984] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.679746] exe[260202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.847149] exe[298575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456509.043512] exe[289494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456509.230462] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.266566] exe[277017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.328375] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.369582] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456513.441233] warn_bad_vsyscall: 81 callbacks suppressed [21456513.441236] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b097 di:ffffffffff600000 [21456513.549367] exe[290024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187097 di:ffffffffff600000 [21456513.845149] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.013889] exe[262209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456514.178607] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.319553] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.466224] exe[289378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456514.651231] exe[261001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.688730] exe[297845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.874248] exe[289310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456518.596191] warn_bad_vsyscall: 25 callbacks suppressed [21456518.596195] exe[260381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.739075] exe[265289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456518.906730] exe[289485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.951481] exe[289653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.136672] exe[298568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.261055] exe[282634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa2d858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.376198] exe[272988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456519.485841] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456519.596218] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.747608] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456523.701767] warn_bad_vsyscall: 32 callbacks suppressed [21456523.701771] exe[297849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704097 di:ffffffffff600000 [21456523.851927] exe[278227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456523.968029] exe[260293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456524.138529] exe[260326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.293183] exe[272441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456524.487610] exe[289916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.636601] exe[272066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456524.898325] exe[260181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456525.111467] exe[289337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456525.144268] exe[289678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.735258] warn_bad_vsyscall: 54 callbacks suppressed [21456528.735261] exe[266467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.857051] exe[262407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456528.989301] exe[305450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.258166] exe[298720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.305603] exe[262431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.492372] exe[282638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.639379] exe[262462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.702267] exe[262425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.838656] exe[281364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b070 di:ffffffffff600000 [21456529.982536] exe[261855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187070 di:ffffffffff600000 [21456533.833300] warn_bad_vsyscall: 26 callbacks suppressed [21456533.833304] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456533.974542] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.002319] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.030287] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.057690] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.085170] exe[260397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.113883] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.143265] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.169860] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.196693] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456576.862970] warn_bad_vsyscall: 60 callbacks suppressed [21456576.862973] exe[304276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593c2c4eab9 cs:33 sp:7faf15832858 ax:0 si:5593c2ca8062 di:ffffffffff600000 [21456577.038604] exe[281314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2e71f9ab9 cs:33 sp:7fd2ea4fa858 ax:0 si:55f2e7253062 di:ffffffffff600000 [21456778.595862] exe[312068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd60affab9 cs:33 sp:7f99faf12ef8 ax:0 si:20001600 di:ffffffffff600000 [21457156.932066] potentially unexpected fatal signal 5. [21457156.937297] CPU: 66 PID: 308290 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457156.949328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457156.958973] RIP: 0033:0x7fffffffe062 [21457156.962988] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457156.982203] RSP: 002b:000000c0005c5b90 EFLAGS: 00000297 [21457156.989227] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457156.996784] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000556685a00000 [21457157.004354] RBP: 000000c0005c5c28 R08: 0000000000000000 R09: 0000000000000000 [21457157.013301] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c5c18 [21457157.022242] R13: 000000c0005c9f50 R14: 000000c0005281c0 R15: 000000000004a9d9 [21457157.031159] FS: 0000000001f6c6b0 GS: 0000000000000000 [21457350.981244] exe[314203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4eba0aab9 cs:33 sp:7f4b38ad3ef8 ax:0 si:20002340 di:ffffffffff600000 [21457840.978269] potentially unexpected fatal signal 5. [21457840.983500] CPU: 40 PID: 300043 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457840.995498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457841.005209] RIP: 0033:0x7fffffffe062 [21457841.010578] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457841.031187] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21457841.038224] RAX: 00007fb2b8bb0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457841.047153] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2b8bb0000 [21457841.056096] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000a915000 [21457841.065031] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21457841.073966] R13: 0000000002883b00 R14: 000000c0002fd500 R15: 0000000000049000 [21457841.082902] FS: 000000000463f3c0 GS: 0000000000000000 [21458571.829891] potentially unexpected fatal signal 5. [21458571.835121] CPU: 33 PID: 351394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21458571.847148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21458571.856777] RIP: 0033:0x7fffffffe062 [21458571.860810] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21458571.880147] RSP: 002b:000000c0006afb90 EFLAGS: 00000297 [21458571.887161] RAX: 0000564ea5e00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21458571.896117] RDX: 0000000000000003 RSI: 0000000000196000 RDI: 0000564ea5e00000 [21458571.905100] RBP: 000000c0006afc28 R08: 0000000000000009 R09: 000000000a248000 [21458571.914067] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0006afc18 [21458571.923015] R13: 000000c0006b7620 R14: 000000c000007c00 R15: 0000000000055934 [21458571.931987] FS: 000000c00013b098 GS: 0000000000000000 [21458972.601295] exe[353364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e3e519ab9 cs:33 sp:7f57c6abd858 ax:0 si:555e3e573062 di:ffffffffff600000 [21459088.679755] exe[347574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e88afab9 cs:33 sp:7f21018a4ef8 ax:0 si:20000040 di:ffffffffff600000 [21459597.368617] exe[327770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21a1c6237 cs:33 sp:7ee82d39fef8 ax:2f700000 si:55a21a2342f7 di:ffffffffff600000 [21460278.285743] exe[339917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55764e71cab9 cs:33 sp:7fdf6c512858 ax:0 si:55764e776097 di:ffffffffff600000 [21460671.403584] exe[377114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c4c49f237 cs:33 sp:7f27dc2a7ef8 ax:2f700000 si:558c4c50d2f7 di:ffffffffff600000 [21461089.227994] exe[420544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55672df6dab9 cs:33 sp:7f4699cb4858 ax:0 si:55672dfc7070 di:ffffffffff600000 [21461274.972092] exe[423796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e202a8ab9 cs:33 sp:7fef9d91def8 ax:0 si:20000b00 di:ffffffffff600000 [21461459.019602] exe[396466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7d1a66ab9 cs:33 sp:7f2e13aad858 ax:0 si:55d7d1ac0062 di:ffffffffff600000 [21461495.056352] exe[344611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bf6d19ab9 cs:33 sp:7f4a3a92eef8 ax:0 si:20000240 di:ffffffffff600000 [21461495.216417] exe[396962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d5eb93ab9 cs:33 sp:7f0c034d7ef8 ax:0 si:20000240 di:ffffffffff600000 [21461525.259533] exe[416934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7c37aab9 cs:33 sp:7f1428487858 ax:0 si:559b7c3d4070 di:ffffffffff600000 [21461631.466325] potentially unexpected fatal signal 5. [21461631.471581] CPU: 9 PID: 343536 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21461631.483578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21461631.493219] RIP: 0033:0x7fffffffe062 [21461631.497243] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21461631.517838] RSP: 002b:000000c000395be8 EFLAGS: 00000297 [21461631.523514] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21461631.531165] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21461631.538718] RBP: 000000c000395c80 R08: 0000000000000000 R09: 0000000000000000 [21461631.546266] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000395c70 [21461631.553813] R13: 000000c0004a2000 R14: 000000c000007340 R15: 0000000000052e7b [21461631.561361] FS: 000000c000510098 GS: 0000000000000000 [21461882.371487] exe[403778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560d205eab9 cs:33 sp:7fcb61180858 ax:0 si:5560d20b8097 di:ffffffffff600000 [21462027.546570] exe[432030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a88979ab9 cs:33 sp:7ec07bfe3858 ax:0 si:562a889d3062 di:ffffffffff600000 [21462400.064490] potentially unexpected fatal signal 5. [21462400.069762] CPU: 91 PID: 413916 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462400.081743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462400.091378] RIP: 0033:0x7fffffffe062 [21462400.095371] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462400.114583] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462400.120216] RAX: 00007ff3de963000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462400.127820] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007ff3de963000 [21462400.135401] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000b3ef000 [21462400.144331] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21462400.153281] R13: 000000c000200008 R14: 000000c0002028c0 R15: 00000000000645cd [21462400.162222] FS: 00007fb88f7fe6c0 GS: 0000000000000000 [21462419.648958] potentially unexpected fatal signal 5. [21462419.654207] CPU: 80 PID: 450647 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462419.666237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462419.675869] RIP: 0033:0x7fffffffe062 [21462419.679856] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462419.699052] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462419.704743] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462419.713675] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055ffe0400000 [21462419.722596] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21462419.731532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21462419.740450] R13: 000000c000143008 R14: 000000c000429a40 R15: 000000000006dbce [21462419.749346] FS: 00007f8083fff6c0 GS: 0000000000000000 [21462500.503105] potentially unexpected fatal signal 5. [21462500.508330] CPU: 2 PID: 408775 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462500.520233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462500.529866] RIP: 0033:0x7fffffffe062 [21462500.533841] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462500.553017] RSP: 002b:000000c00016fb90 EFLAGS: 00000297 [21462500.558696] RAX: 000055acd50d1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462500.567600] RDX: 0000000000000001 RSI: 0000000000054000 RDI: 000055acd50d1000 [21462500.576550] RBP: 000000c00016fc28 R08: 0000000000000009 R09: 000000000cb7f000 [21462500.585501] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00016fc18 [21462500.594474] R13: 000000c000167f20 R14: 000000c00015d340 R15: 0000000000063841 [21462500.603441] FS: 000000c000180898 GS: 0000000000000000 [21462554.601170] exe[455149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d2cc78ab9 cs:33 sp:7f26b9e7a858 ax:0 si:558d2ccd2062 di:ffffffffff600000 [21463728.603384] potentially unexpected fatal signal 5. [21463728.608621] CPU: 10 PID: 461475 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21463728.620590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21463728.630236] RIP: 0033:0x7fffffffe062 [21463728.634282] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21463728.654885] RSP: 002b:000000c0006c1b90 EFLAGS: 00000297 [21463728.661863] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21463728.670825] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000561707200000 [21463728.679754] RBP: 000000c0006c1c28 R08: 0000000000000000 R09: 0000000000000000 [21463728.688662] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006c1c18 [21463728.697606] R13: 000000c0004357d0 R14: 000000c00047d880 R15: 000000000006f840 [21463728.706564] FS: 000000c00013b098 GS: 0000000000000000 [21463918.363665] exe[498331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37d1aaab9 cs:33 sp:7faae6ff0858 ax:0 si:55e37d204062 di:ffffffffff600000 [21464978.895311] exe[513103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565e578b237 cs:33 sp:7ee19ecf6ef8 ax:2f700000 si:5565e57f92f7 di:ffffffffff600000 [21465814.712561] exe[532275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581817deab9 cs:33 sp:7f7372e73858 ax:0 si:558181838062 di:ffffffffff600000 [21465970.933597] exe[531225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56275ec32ab9 cs:33 sp:7fb8148e7858 ax:0 si:56275ec8c062 di:ffffffffff600000 [21465998.713880] exe[530024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ef52dab9 cs:33 sp:7fb51ad60858 ax:0 si:5575ef587062 di:ffffffffff600000 [21466073.649116] exe[489951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55850896a6a2 cs:33 sp:7f793ead4f98 ax:7f793ead4fb0 si:ffffffffff600000 di:7f793ead4fb0 [21466214.704919] exe[512754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634298ce237 cs:33 sp:7ea8b58b3ef8 ax:2f700000 si:56342993c2f7 di:ffffffffff600000 [21467351.746990] potentially unexpected fatal signal 5. [21467351.752328] CPU: 67 PID: 493396 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467351.764322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467351.773934] RIP: 0033:0x7fffffffe062 [21467351.777897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467351.797143] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467351.802824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467351.811731] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21467351.820668] RBP: 000000c0002c1c28 R08: 0000000000000000 R09: 0000000000000000 [21467351.829589] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002c1c18 [21467351.838487] R13: 000000c000432150 R14: 000000c0004d6a80 R15: 0000000000078237 [21467351.847425] FS: 000000c00013b898 GS: 0000000000000000 [21467364.667673] exe[520501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc06efbab9 cs:33 sp:7f303b88b858 ax:0 si:55bc06f55062 di:ffffffffff600000 [21467469.112354] exe[561975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556feb65e237 cs:33 sp:7f41d63aaef8 ax:2f700000 si:556feb6cc2f7 di:ffffffffff600000 [21467749.282585] potentially unexpected fatal signal 5. [21467749.287818] CPU: 24 PID: 554176 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.299863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.309507] RIP: 0033:0x7fffffffe062 [21467749.313506] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.332713] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.338351] RAX: 00007fa409800000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.345893] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 00007fa409800000 [21467749.353432] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000021a00000 [21467749.360223] potentially unexpected fatal signal 5. [21467749.360989] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.366181] CPU: 39 PID: 560755 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.366185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.373719] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.373721] FS: 000000c00013b098 GS: 0000000000000000 [21467749.408585] RIP: 0033:0x7fffffffe062 [21467749.413949] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.433154] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.440241] RAX: 0000558eeee11000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.449180] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000558eeee11000 [21467749.458129] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000014a9b000 [21467749.467042] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.475991] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.484910] FS: 000000c00013b098 GS: 0000000000000000 [21467759.095320] exe[570907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d255a9adb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f006faf7fb0 [21467760.423716] exe[520433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625160dbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2b1c924fb0 [21467763.640219] exe[559748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c91627db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f54467fefb0 [21467842.868358] exe[577457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398add9237 cs:33 sp:7ec359a47ef8 ax:2f700000 si:56398ae472f7 di:ffffffffff600000 [21467866.934382] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739bbf8db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7efddcc3ffb0 [21467886.984744] exe[576231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee683cbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f6ae76ecfb0 [21467890.678766] exe[576497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605b6f1cdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fd8be6acfb0 [21467892.542036] exe[576023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1b1db3db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7eef2a7e2fb0 [21467899.102611] exe[574692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a1e1b6db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fb40c7fefb0 [21467899.244024] exe[574672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e2533db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f304e5c2fb0 [21467904.440820] exe[559762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581f3792db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed9d844afb0 [21467918.653559] exe[535838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a09259edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed8df9dbfb0 [21468226.191778] exe[512974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cde925aab9 cs:33 sp:7eb9254d5858 ax:0 si:55cde92b4062 di:ffffffffff600000 [21468246.434472] exe[592923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614c89f0ab9 cs:33 sp:7ece0823eef8 ax:0 si:20002780 di:ffffffffff600000 [21468599.402746] exe[533564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14e08ddb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2261f17fb0 [21468710.682821] exe[595403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebd1687ab9 cs:33 sp:7ecea8dfeef8 ax:0 si:200000c0 di:ffffffffff600000 [21469178.740239] exe[553398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469178.847277] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.890347] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0a9858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.899337] exe[555134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afb5d21ab9 cs:33 sp:7fd254341858 ax:0 si:55afb5d7b062 di:ffffffffff600000 [21469179.063525] exe[552157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469179.236431] exe[552242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469179.386465] exe[587752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469179.551832] exe[552188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469297.758573] potentially unexpected fatal signal 5. [21469297.763809] CPU: 78 PID: 608449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469297.775843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469297.785468] RIP: 0033:0x7fffffffe062 [21469297.789441] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469297.808598] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469297.814206] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469297.821729] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469297.829250] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469297.836772] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469297.844286] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469297.851826] FS: 000000c00013b098 GS: 0000000000000000 [21469298.163765] potentially unexpected fatal signal 5. [21469298.168991] CPU: 41 PID: 602132 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.180980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.190676] RIP: 0033:0x7fffffffe062 [21469298.194636] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.213831] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.219866] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.227452] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.236394] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.243954] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21469298.252900] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.261834] FS: 000000c00013b098 GS: 0000000000000000 [21469298.598127] potentially unexpected fatal signal 5. [21469298.603348] CPU: 78 PID: 618111 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.615334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.617411] potentially unexpected fatal signal 5. [21469298.625001] RIP: 0033:0x7fffffffe062 [21469298.625006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630286] CPU: 25 PID: 604302 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.630288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.630294] RIP: 0033:0x7fffffffe062 [21469298.630298] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630299] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.630302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.630302] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.630304] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.630304] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.630305] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.630306] FS: 000000c00013b098 GS: 0000000000000000 [21469298.757094] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.762778] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.771718] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.780660] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.789618] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.798584] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.807504] FS: 000000c00013b098 GS: 0000000000000000 [21469574.669749] potentially unexpected fatal signal 11. [21469574.675076] CPU: 32 PID: 620584 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469574.687178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469574.696819] RIP: 0033:0x564aa86f1c25 [21469574.700813] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21469574.720112] RSP: 002b:00007f3f689e4440 EFLAGS: 00010246 [21469574.725790] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000564aa86f1e0d [21469574.733364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21469574.740950] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000564aa9352320 [21469574.748536] R10: 0000564aa9353480 R11: 0000564aa9352320 R12: 0000000000000000 [21469574.756110] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21469574.763681] FS: 0000564aa9353480 GS: 0000000000000000 [21470980.613558] potentially unexpected fatal signal 5. [21470980.618804] CPU: 89 PID: 655177 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21470980.630782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21470980.640410] RIP: 0033:0x7fffffffe062 [21470980.644376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21470980.663560] RSP: 002b:000000c0005d9b90 EFLAGS: 00000297 [21470980.669251] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21470980.678162] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007f6afe600000 [21470980.687125] RBP: 000000c0005d9c28 R08: 0000000000000000 R09: 0000000000000000 [21470980.694685] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005d9c18 [21470980.703643] R13: 000000c000296f60 R14: 000000c000498e00 R15: 000000000009ed0e [21470980.712558] FS: 000000c00013b098 GS: 0000000000000000 [21471310.267546] exe[632672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acda42fab9 cs:33 sp:7f04176f0858 ax:0 si:55acda489062 di:ffffffffff600000 [21471753.283716] exe[679113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776f0caab9 cs:33 sp:7fe5489ea858 ax:0 si:55776f124062 di:ffffffffff600000 [21471761.906531] exe[594577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558308062ab9 cs:33 sp:7f2e6bfacef8 ax:0 si:20000100 di:ffffffffff600000 [21471762.104739] exe[594663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2d81e3ab9 cs:33 sp:7f42fd486ef8 ax:0 si:20000100 di:ffffffffff600000 [21472111.523931] exe[623095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a646ed237 cs:33 sp:7fc3e4737ef8 ax:2f700000 si:563a6475b2f7 di:ffffffffff600000 [21472569.034266] exe[689624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.308129] exe[690338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472569.555031] exe[689413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.807115] exe[688626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472570.054573] exe[672615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472570.231706] exe[690344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f097 di:ffffffffff600000 [21472570.484629] exe[690352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e062 di:ffffffffff600000 [21472571.749834] exe[689805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472684.647192] exe[684550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f062 di:ffffffffff600000 [21472684.800694] exe[670931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b18da7ab9 cs:33 sp:7f6b6e842858 ax:0 si:562b18e01062 di:ffffffffff600000 [21472727.258715] exe[694910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636eea98ab9 cs:33 sp:7f2d5b6e4ef8 ax:0 si:20000980 di:ffffffffff600000 [21472832.318082] exe[679524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556287e96ab9 cs:33 sp:7ecd6a756ef8 ax:0 si:20002780 di:ffffffffff600000 [21472917.771566] potentially unexpected fatal signal 5. [21472917.776782] CPU: 89 PID: 621861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.788766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.798417] RIP: 0033:0x7fffffffe062 [21472917.800096] potentially unexpected fatal signal 5. [21472917.802400] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.807814] CPU: 29 PID: 661226 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.807816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.807820] RIP: 0033:0x7fffffffe062 [21472917.807824] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.827032] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.827034] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.827035] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472917.827035] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472917.827036] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.827036] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.827037] FS: 000000c000180898 GS: 0000000000000000 [21472917.837444] potentially unexpected fatal signal 5. [21472917.840387] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.850027] CPU: 94 PID: 697815 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.850029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.850033] RIP: 0033:0x7fffffffe062 [21472917.850035] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.850036] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.855365] RAX: 0000561133622000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.855366] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000561133622000 [21472917.855366] RBP: 000000c0004e7c28 R08: 0000000000000009 R09: 0000000000dfc000 [21472917.855367] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.855367] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.855368] FS: 000000c000180898 GS: 0000000000000000 [21472918.041108] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472918.048674] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472918.057581] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472918.065169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472918.074097] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472918.083027] FS: 000000c000180898 GS: 0000000000000000 [21473050.901525] exe[675123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb0359ab9 cs:33 sp:7eff9c3fd858 ax:0 si:556fb03b3062 di:ffffffffff600000 [21473051.090358] exe[707647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b863faab9 cs:33 sp:7f375bd07858 ax:0 si:557b86454062 di:ffffffffff600000 [21473161.005410] exe[706242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56188ba59ab9 cs:33 sp:7f5da51af858 ax:0 si:56188bab3062 di:ffffffffff600000 [21473273.199113] potentially unexpected fatal signal 5. [21473273.204361] CPU: 45 PID: 641771 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21473273.216341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21473273.226010] RIP: 0033:0x7fffffffe062 [21473273.230031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21473273.254833] RSP: 002b:000000c0007e9be8 EFLAGS: 00000297 [21473273.261825] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21473273.270749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21473273.279737] RBP: 000000c0007e9c80 R08: 0000000000000000 R09: 0000000000000000 [21473273.288645] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0007e9c70 [21473273.297597] R13: 000000c000709000 R14: 000000c0004508c0 R15: 0000000000099c66 [21473273.306549] FS: 000000c000181098 GS: 0000000000000000 [21473639.198103] exe[713242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f99343237 cs:33 sp:7facd3edbef8 ax:2f700000 si:556f993b12f7 di:ffffffffff600000 [21473639.309251] exe[719280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584975a6237 cs:33 sp:7f54d430def8 ax:2f700000 si:5584976142f7 di:ffffffffff600000 [21474433.226169] potentially unexpected fatal signal 11. [21474433.231508] CPU: 47 PID: 732070 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474433.243494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474433.253144] RIP: 0033:0x55ababf92939 [21474433.257194] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474433.276444] RSP: 002b:00007faacfe42440 EFLAGS: 00010206 [21474433.283894] RAX: 00000000000000ac RBX: 0000000000000000 RCX: 000055ababf92dd3 [21474433.292879] RDX: 00000000000000ac RSI: 0000000000000000 RDI: 0000000001200011 [21474433.301848] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474433.310787] R10: 000055abacbf4750 R11: 0000000000000246 R12: 00000000000000ac [21474433.319760] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474433.328713] FS: 000055abacbf4480 GS: 0000000000000000 [21474486.052660] exe[724386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e48931bab9 cs:33 sp:7f9d7503c858 ax:0 si:55e489375070 di:ffffffffff600000 [21474522.088569] exe[727745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f7a82ab9 cs:33 sp:7fda66dbf858 ax:0 si:5568f7adc062 di:ffffffffff600000 [21474832.760128] exe[747400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594970afab9 cs:33 sp:7fbe7b3a0858 ax:0 si:559497109070 di:ffffffffff600000 [21474857.677082] exe[692971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619cf693ab9 cs:33 sp:7fdf7ee49858 ax:0 si:5619cf6ed062 di:ffffffffff600000 [21474879.155450] potentially unexpected fatal signal 11. [21474879.160783] CPU: 9 PID: 747410 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474879.172687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474879.182332] RIP: 0033:0x56223dc70939 [21474879.186369] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474879.205574] RSP: 002b:00007fbd2884b440 EFLAGS: 00010202 [21474879.212684] RAX: 00000000000002b9 RBX: 0000000000000000 RCX: 000056223dc70dd3 [21474879.220206] RDX: 00000000000002b9 RSI: 0000000000000000 RDI: 0000000001200011 [21474879.227745] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474879.236670] R10: 000056223e8d2750 R11: 0000000000000246 R12: 00000000000002b9 [21474879.245643] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474879.254548] FS: 000056223e8d2480 GS: 0000000000000000 [21474970.540643] potentially unexpected fatal signal 11. [21474970.545979] CPU: 93 PID: 743608 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474970.557964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474970.567624] RIP: 0033:0x559dac617ae7 [21474970.571663] Code: 54 10 00 01 00 00 00 48 c7 05 71 54 10 00 00 00 00 00 c7 05 57 54 10 00 01 00 00 00 0f 11 05 c0 54 10 00 0f 11 05 39 54 10 00 <64> 4c 8b 14 25 10 00 00 00 48 85 c0 74 52 48 89 c2 48 83 e2 fe a8 [21474970.590863] RSP: 002b:00007fe06f67d440 EFLAGS: 00010202 [21474970.597914] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000559dac617e0d [21474970.605494] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000559dad279760 [21474970.614429] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000559dad278320 [21474970.623350] R10: 0000559dad279750 R11: 0000559dad278320 R12: 0000000000000000 [21474970.630910] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21474970.639841] FS: 0000559dad279480 GS: 0000000000000000 [21475909.194964] exe[773601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a39eadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21475909.561124] exe[747828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560474c7bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21476127.975264] exe[771443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bd617edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f90c6aecfb0 [21476783.706034] exe[794571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5df63cab9 cs:33 sp:7f8ed6ab1ef8 ax:0 si:20003700 di:ffffffffff600000 [21477144.587669] exe[804852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dcaf42ab9 cs:33 sp:7eb087e4def8 ax:0 si:20000280 di:ffffffffff600000 [21477156.677327] exe[791612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b82e17ab9 cs:33 sp:7ebff14f8858 ax:0 si:559b82e71062 di:ffffffffff600000 [21477165.321006] exe[744296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591ec74fab9 cs:33 sp:7faa65eecef8 ax:0 si:20000280 di:ffffffffff600000 [21477189.114957] exe[745613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cc5e5dab9 cs:33 sp:7fbd89ad3858 ax:0 si:556cc5eb7062 di:ffffffffff600000 [21477542.320802] exe[782266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb9a348ab9 cs:33 sp:7f3271423858 ax:0 si:55cb9a3a2062 di:ffffffffff600000 [21477544.431619] exe[784210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7f1154ab9 cs:33 sp:7f87ef6f6858 ax:0 si:55b7f11ae062 di:ffffffffff600000 [21477548.287765] exe[761064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b1ab9 cs:33 sp:7f0e195fc858 ax:0 si:563ec320b062 di:ffffffffff600000 [21477549.352357] exe[780574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ed757bab9 cs:33 sp:7fb2b8aac858 ax:0 si:558ed75d5062 di:ffffffffff600000 [21477549.607344] exe[808166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56141b2fbab9 cs:33 sp:7eceea3db858 ax:0 si:56141b355062 di:ffffffffff600000 [21477551.490360] exe[806743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e54051ab9 cs:33 sp:7f7f4c46c858 ax:0 si:558e540ab062 di:ffffffffff600000 [21477554.129888] exe[793703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fb3d42ab9 cs:33 sp:7ee0876e8858 ax:0 si:563fb3d9c062 di:ffffffffff600000 [21477656.470322] exe[782858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea247c7ab9 cs:33 sp:7fbe55948858 ax:0 si:55ea24821062 di:ffffffffff600000 [21477660.861385] exe[760596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745aee5ab9 cs:33 sp:7f1756f33858 ax:0 si:55745af3f062 di:ffffffffff600000 [21477664.663480] exe[809737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fb07b8ab9 cs:33 sp:7f213effe858 ax:0 si:555fb0812062 di:ffffffffff600000 [21477665.350795] exe[796310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc68005ab9 cs:33 sp:7f7989ca3ef8 ax:0 si:20000280 di:ffffffffff600000 [21477700.557299] exe[810118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cbef4ab9 cs:33 sp:7ef66b5a1ef8 ax:0 si:20003e80 di:ffffffffff600000 [21477919.026029] exe[806393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565142328237 cs:33 sp:7ed0f5243ef8 ax:2f700000 si:5651423962f7 di:ffffffffff600000 [21478171.460680] exe[809767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce1302d237 cs:33 sp:7ed796effef8 ax:2f700000 si:55ce1309b2f7 di:ffffffffff600000 [21478384.056987] exe[824026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56095dcd1ab9 cs:33 sp:7f2096b9b858 ax:0 si:56095dd2b062 di:ffffffffff600000 [21478420.407252] potentially unexpected fatal signal 5. [21478420.412488] CPU: 16 PID: 811262 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478420.424472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478420.434095] RIP: 0033:0x7fffffffe062 [21478420.438078] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478420.457284] RSP: 002b:000000c0004d3b90 EFLAGS: 00000297 [21478420.462951] RAX: 0000001b2c020000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478420.470502] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b2c020000 [21478420.478074] RBP: 000000c0004d3c28 R08: 0000000000000009 R09: 000000001de00000 [21478420.485617] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004d3c18 [21478420.494536] R13: 000000c0004dcb10 R14: 000000c00050a380 R15: 00000000000c5d8a [21478420.503654] FS: 000000c000478098 GS: 0000000000000000 [21478510.223216] potentially unexpected fatal signal 5. [21478510.228464] CPU: 31 PID: 792294 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478510.240476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478510.250181] RIP: 0033:0x7fffffffe062 [21478510.254179] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478510.273408] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21478510.280428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478510.289402] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478510.298318] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21478510.307259] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21478510.316229] R13: 0000000002883b00 R14: 000000c000183180 R15: 00000000000b6d3d [21478510.325169] FS: 0000000004b153c0 GS: 0000000000000000 [21478577.469029] exe[824326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe53ef3ab9 cs:33 sp:7fa3cdb3f858 ax:0 si:55fe53f4d062 di:ffffffffff600000 [21478700.342208] exe[830651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8c7aed6a2 cs:33 sp:7f5b6cf6bf98 ax:7f5b6cf6bfb0 si:ffffffffff600000 di:7f5b6cf6bfb0 [21478872.906529] potentially unexpected fatal signal 5. [21478872.911810] CPU: 63 PID: 810753 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478872.923829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478872.933491] RIP: 0033:0x7fffffffe062 [21478872.937541] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478872.958122] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [21478872.965131] RAX: 00000000000cd2d4 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478872.974040] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [21478872.981610] RBP: 000000c0005fdc28 R08: 000000c00050e100 R09: 0000000000000000 [21478872.989152] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005fdc18 [21478872.996699] R13: 000000c00035ff50 R14: 000000c000501500 R15: 00000000000c5eeb [21478873.004247] FS: 000000c00013b098 GS: 0000000000000000 [21478884.173897] potentially unexpected fatal signal 5. [21478884.179115] CPU: 66 PID: 829817 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478884.191098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478884.200794] RIP: 0033:0x7fffffffe062 [21478884.204767] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478884.225334] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21478884.232345] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478884.241299] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478884.250196] RBP: 000000c0005fbc28 R08: 0000000000000000 R09: 0000000000000000 [21478884.257729] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fbc18 [21478884.266661] R13: 000000c000018b10 R14: 000000c00033f500 R15: 00000000000ca695 [21478884.275592] FS: 000000c000180898 GS: 0000000000000000 [21479052.894729] exe[805774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c9517ab9 cs:33 sp:7efbab512858 ax:0 si:5569c9571062 di:ffffffffff600000 [21479161.680204] exe[816693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55567124eab9 cs:33 sp:7ff98fb24ef8 ax:0 si:20001400 di:ffffffffff600000 [21479250.728328] potentially unexpected fatal signal 5. [21479250.733567] CPU: 18 PID: 847524 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479250.745571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479250.755218] RIP: 0033:0x7fffffffe062 [21479250.759278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21479250.779877] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21479250.786884] RAX: 0000562b4c097000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21479250.795796] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000562b4c097000 [21479250.804752] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000013743000 [21479250.813641] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21479250.822596] R13: 000000c000180808 R14: 000000c000512540 R15: 00000000000cec0b [21479250.831524] FS: 00007f0184bbf6c0 GS: 0000000000000000 [21479337.250524] potentially unexpected fatal signal 11. [21479337.255835] CPU: 29 PID: 851022 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479337.267814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479337.277450] RIP: 0033:0x558de0e8dc25 [21479337.281422] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21479337.300642] RSP: 002b:00007f74c4800440 EFLAGS: 00010246 [21479337.306271] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000558de0e8de0d [21479337.313914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21479337.322786] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000558de1aee320 [21479337.331716] R10: 0000558de1aef480 R11: 0000558de1aee320 R12: 0000000000000000 [21479337.340732] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21479337.349670] FS: 0000558de1aef480 GS: 0000000000000000 [21479649.942904] potentially unexpected fatal signal 11. [21479649.948222] CPU: 94 PID: 842697 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479649.960207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479649.969834] RIP: 0033:0x5593fc59437b [21479649.973849] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21479649.993047] RSP: 002b:00007fe5bfc60310 EFLAGS: 00010246 [21479650.000106] RAX: 00007fe5bfc60470 RBX: 00007fe5bfc60470 RCX: 0000000000000000 [21479650.009030] RDX: 00007fec7c0000a8 RSI: 00007fe5bfc604e0 RDI: 00007fe5bfc604f0 [21479650.016578] RBP: 0000000000000000 R08: 00007fec7c0000a8 R09: 00005593fc708f8c [21479650.025522] R10: 0000000000000006 R11: 00000000861c4adf R12: 00005593fc708f80 [21479650.034458] R13: 0000000000000ff4 R14: 00005593fc708f80 R15: 00007fe5bfc60418 [21479650.043391] FS: 00005593fd239480 GS: 0000000000000000 [21479699.397909] exe[859624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623330aaab9 cs:33 sp:7ea5cf5ec858 ax:0 si:562333104062 di:ffffffffff600000 [21480023.529021] exe[865602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2a9a66db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20000 [21480243.333785] potentially unexpected fatal signal 5. [21480243.339027] CPU: 1 PID: 801895 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480243.350926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480243.360596] RIP: 0033:0x7fffffffe062 [21480243.364610] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480243.385199] RSP: 002b:000000c000619b90 EFLAGS: 00000297 [21480243.392215] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480243.401117] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480243.410032] RBP: 000000c000619c28 R08: 0000000000000000 R09: 0000000000000000 [21480243.418937] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000619c18 [21480243.427866] R13: 000000c00027f3e0 R14: 000000c00047cfc0 R15: 00000000000c2cbf [21480243.436880] FS: 0000000001f6c6b0 GS: 0000000000000000 [21480244.143323] potentially unexpected fatal signal 5. [21480244.148538] CPU: 70 PID: 881452 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480244.160506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480244.170154] RIP: 0033:0x7fffffffe062 [21480244.174145] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480244.193378] RSP: 002b:000000c0006bdb90 EFLAGS: 00000297 [21480244.200354] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480244.209243] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480244.218167] RBP: 000000c0006bdc28 R08: 0000000000000000 R09: 0000000000000000 [21480244.227081] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006bdc18 [21480244.235993] R13: 000000c0006d12f0 R14: 000000c000582700 R15: 00000000000d6880 [21480244.244903] FS: 0000000001f6c6b0 GS: 0000000000000000 [21481121.618219] potentially unexpected fatal signal 11. [21481121.623525] CPU: 17 PID: 902823 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.635530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.645154] RIP: 0033:0x562def94d0e9 [21481121.649162] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21481121.668331] RSP: 002b:00007f0a074b9448 EFLAGS: 00010213 [21481121.673970] RAX: 0000000000000016 RBX: 0000562def9973b9 RCX: 0000562def94d0d7 [21481121.681498] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f0a074ba5c0 [21481121.689070] RBP: 00007f0a074ba59c R08: 000000000ff9287e R09: 000000000000064a [21481121.696600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a074ba5c0 [21481121.704150] R13: 0000562def9973b9 R14: 00000000000c4511 R15: 0000000000000001 [21481121.711687] FS: 0000562df05aa480 GS: 0000000000000000 [21481121.740008] potentially unexpected fatal signal 5. [21481121.746288] CPU: 0 PID: 872651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.758220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.767921] RIP: 0033:0x7fffffffe062 [21481121.771910] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21481121.792490] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21481121.798119] RAX: 000055baa24c3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21481121.805681] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055baa24c3000 [21481121.813230] RBP: 000000c0007b5c80 R08: 0000000000000009 R09: 00000000015ff000 [21481121.820813] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0007b5c70 [21481121.828377] R13: 000000c0007c8000 R14: 000000c000600700 R15: 00000000000d33d0 [21481121.835944] FS: 0000000002207a30 GS: 0000000000000000 [21482335.349100] exe[1044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.506353] exe[986244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.513247] exe[992689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.587041] exe[995596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.603431] exe[985950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482335.655893] exe[992148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.717672] exe[985974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482590.318033] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.466654] exe[998500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.589375] exe[989500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.600870] exe[16739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.727136] exe[998442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.729617] exe[980723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.844729] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482693.531235] exe[16690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5a95cddb1 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:6104a600 [21482845.725119] exe[9897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae682ec237 cs:33 sp:7f3a88091ef8 ax:2f700000 si:55ae6835a2f7 di:ffffffffff600000 [21482851.027934] exe[984448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555efcd3aab9 cs:33 sp:7eafe8581ef8 ax:0 si:200001c0 di:ffffffffff600000 [21483101.697538] exe[3885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605293b0237 cs:33 sp:7f73e722aef8 ax:2f700000 si:56052941e2f7 di:ffffffffff600000 [21484774.127790] potentially unexpected fatal signal 5. [21484774.133075] CPU: 86 PID: 10961 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21484774.145027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21484774.154682] RIP: 0033:0x7fffffffe062 [21484774.158733] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21484774.179289] RSP: 002b:000000c000765be8 EFLAGS: 00000297 [21484774.186327] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21484774.195265] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21484774.204186] RBP: 000000c000765c80 R08: 0000000000000000 R09: 0000000000000000 [21484774.213108] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000765c70 [21484774.222155] R13: 000000c000772800 R14: 000000c0003f2fc0 R15: 00000000000ee3eb [21484774.231057] FS: 000000c000180098 GS: 0000000000000000 [21484775.493485] exe[987631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561befba7ab9 cs:33 sp:7f6e4f687858 ax:0 si:561befc01062 di:ffffffffff600000 [21484775.641069] exe[40620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21484775.773756] exe[988558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56492487cab9 cs:33 sp:7f85b465f858 ax:0 si:5649248d6062 di:ffffffffff600000 [21484775.899887] exe[988584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21485248.883548] exe[72235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bee897eab9 cs:33 sp:7fd5b25db858 ax:0 si:55bee89d8062 di:ffffffffff600000 [21485597.395702] exe[76974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a82a8ab9 cs:33 sp:7ff9f9428858 ax:0 si:55c3a8302097 di:ffffffffff600000 [21486064.276064] exe[69844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d7b35237 cs:33 sp:7f6772a78ef8 ax:2f700000 si:5603d7ba32f7 di:ffffffffff600000 [21486082.220054] exe[66011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b47f646237 cs:33 sp:7eb15db77ef8 ax:2f700000 si:55b47f6b42f7 di:ffffffffff600000 [21486082.854751] exe[80182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f758499237 cs:33 sp:7f96898e4ef8 ax:2f700000 si:55f7585072f7 di:ffffffffff600000 [21486086.027070] exe[37063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adeec17237 cs:33 sp:7f4916f9bef8 ax:2f700000 si:55adeec852f7 di:ffffffffff600000 [21486132.261857] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486140.595878] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614d2fc9ab9 cs:33 sp:7eeb438bf858 ax:0 si:5614d3023062 di:ffffffffff600000 [21486148.783739] exe[63461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fcfd28ab9 cs:33 sp:7eef636b6858 ax:0 si:560fcfd82062 di:ffffffffff600000 [21486148.899957] exe[73499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486378.537877] exe[993887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c75533237 cs:33 sp:7f67f3c8fef8 ax:2f700000 si:556c755a12f7 di:ffffffffff600000 [21486383.062786] exe[12601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564e0d65237 cs:33 sp:7fe4788ecef8 ax:2f700000 si:5564e0dd32f7 di:ffffffffff600000 [21486670.442980] exe[34914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeffb3c237 cs:33 sp:7fc2fc50bef8 ax:2f700000 si:55eeffbaa2f7 di:ffffffffff600000 [21486831.201722] exe[71317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573e3201ab9 cs:33 sp:7fed18084858 ax:0 si:5573e325b062 di:ffffffffff600000 [21486855.593161] exe[37602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2868e237 cs:33 sp:7eb24b84eef8 ax:2f700000 si:558c286fc2f7 di:ffffffffff600000 [21487075.384724] exe[53227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565345b1fab9 cs:33 sp:7f9a71770858 ax:0 si:565345b79062 di:ffffffffff600000 [21487161.886037] exe[77175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9fea9d237 cs:33 sp:7ff3e4381ef8 ax:2f700000 si:55c9feb0b2f7 di:ffffffffff600000 [21487269.246050] exe[92835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621941d9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:204000 [21487388.893924] exe[53398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55611e3fe237 cs:33 sp:7feb32bd8ef8 ax:2f700000 si:55611e46c2f7 di:ffffffffff600000 [21487638.813995] exe[80263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487638.917690] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.023233] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.124740] exe[58123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487950.793970] exe[54996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487950.984434] exe[60085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563189fccab9 cs:33 sp:7eb0db991858 ax:0 si:56318a026062 di:ffffffffff600000 [21487951.192313] exe[61555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487951.432673] exe[57336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557781fe3ab9 cs:33 sp:7eb77f99a858 ax:0 si:55778203d062 di:ffffffffff600000 [21488296.011217] exe[18729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf2009c237 cs:33 sp:7f793364cef8 ax:2f700000 si:55cf2010a2f7 di:ffffffffff600000 [21488377.315044] potentially unexpected fatal signal 5. [21488377.320267] CPU: 54 PID: 52185 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21488377.332195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21488377.341873] RIP: 0033:0x7fffffffe062 [21488377.345952] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21488377.366513] RSP: 002b:000000c0007cdbe8 EFLAGS: 00000297 [21488377.373527] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21488377.382455] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21488377.391400] RBP: 000000c0007cdc80 R08: 0000000000000000 R09: 0000000000000000 [21488377.400301] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007cdc70 [21488377.409225] R13: 000000c0006c8800 R14: 000000c00049ce00 R15: 000000000000b8c5 [21488377.418157] FS: 000000c000506898 GS: 0000000000000000 [21488398.951114] exe[29524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa88cd237 cs:33 sp:7f4469d25ef8 ax:2f700000 si:561aa893b2f7 di:ffffffffff600000 [21488471.536086] exe[100303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570afed9237 cs:33 sp:7f363c7feef8 ax:2f700000 si:5570aff472f7 di:ffffffffff600000 [21488537.040749] exe[32841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac3fe22237 cs:33 sp:7ec240b4cef8 ax:2f700000 si:55ac3fe902f7 di:ffffffffff600000 [21488578.931164] exe[110043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e86547237 cs:33 sp:7fa978300ef8 ax:2f700000 si:556e865b52f7 di:ffffffffff600000 [21488710.753761] exe[93342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a86158ab9 cs:33 sp:7f7028ae7858 ax:0 si:558a861b2062 di:ffffffffff600000 [21488900.837349] exe[90269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae20703237 cs:33 sp:7ea2749c1ef8 ax:2f700000 si:55ae207712f7 di:ffffffffff600000 [21488917.816802] exe[77022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560844fe5237 cs:33 sp:7f89ab9dbef8 ax:2f700000 si:5608450532f7 di:ffffffffff600000 [21489069.135922] exe[131570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.319302] exe[129038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584097 di:ffffffffff600000 [21489069.345964] exe[129466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.347076] exe[128818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f3436269858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.481343] exe[131568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.641487] exe[128876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c097 di:ffffffffff600000 [21489069.814621] exe[129565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.995248] exe[131933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c062 di:ffffffffff600000 [21489070.171070] exe[134667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde062 di:ffffffffff600000 [21489070.297033] exe[129593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584062 di:ffffffffff600000 [21489171.087511] warn_bad_vsyscall: 10 callbacks suppressed [21489171.087515] exe[124751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56003e4baab9 cs:33 sp:7f7500446858 ax:0 si:56003e514070 di:ffffffffff600000 [21489337.557745] exe[128193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455fb69ab9 cs:33 sp:7ff630647858 ax:0 si:56455fbc3097 di:ffffffffff600000 [21489337.726272] exe[139876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559efccf9ab9 cs:33 sp:7fcacb2cc858 ax:0 si:559efcd53097 di:ffffffffff600000 [21489423.022047] exe[130159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.123977] exe[128580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21489423.199574] exe[112506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.514587] exe[137623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21490182.691201] exe[140306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56384ac0f237 cs:33 sp:7fb24afbcef8 ax:2f700000 si:56384ac7d2f7 di:ffffffffff600000 [21490325.802951] exe[145680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bed410ab9 cs:33 sp:7f70bb52e858 ax:0 si:562bed46a062 di:ffffffffff600000 [21490488.011838] exe[140658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56303e472ab9 cs:33 sp:7fb631ad8858 ax:0 si:56303e4cc062 di:ffffffffff600000 [21490488.170531] exe[143117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d631e5ab9 cs:33 sp:7f14929cb858 ax:0 si:557d6323f062 di:ffffffffff600000 [21490548.100847] exe[145671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593dc258ab9 cs:33 sp:7ee0e6831858 ax:0 si:5593dc2b2097 di:ffffffffff600000 [21490725.790655] potentially unexpected fatal signal 5. [21490725.795898] CPU: 1 PID: 154164 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490725.807785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490725.817440] RIP: 0033:0x7fffffffe062 [21490725.821498] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490725.842198] RSP: 002b:000000c00078fbe8 EFLAGS: 00000297 [21490725.849221] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490725.858134] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490725.867124] RBP: 000000c00078fc80 R08: 0000000000000000 R09: 0000000000000000 [21490725.876065] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00078fc70 [21490725.884983] R13: 00000000162a7ede R14: 000000c000514700 R15: 000000000002581f [21490725.893896] FS: 000000c00013a898 GS: 0000000000000000 [21490738.728767] potentially unexpected fatal signal 5. [21490738.733992] CPU: 4 PID: 154069 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490738.745918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490738.755595] RIP: 0033:0x7fffffffe062 [21490738.759683] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490738.780289] RSP: 002b:000000c000777be8 EFLAGS: 00000297 [21490738.787286] RAX: 0000000000025be1 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490738.796231] RDX: 0000000000000000 RSI: 000000c000778000 RDI: 0000000000012f00 [21490738.805200] RBP: 000000c000777c80 R08: 000000c000a941f0 R09: 0000000000000000 [21490738.814136] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000777c70 [21490738.823087] R13: 000000c000567800 R14: 000000c000530e00 R15: 000000000002595e [21490738.831992] FS: 0000000002207a30 GS: 0000000000000000 [21490834.622698] potentially unexpected fatal signal 5. [21490834.622984] potentially unexpected fatal signal 5. [21490834.623241] potentially unexpected fatal signal 5. [21490834.623246] CPU: 46 PID: 154655 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.623247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.623252] RIP: 0033:0x7fffffffe062 [21490834.623254] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.623255] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.623257] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.623258] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.623259] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.623260] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.623261] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.623262] FS: 000000c000464098 GS: 0000000000000000 [21490834.627587] potentially unexpected fatal signal 5. [21490834.627593] CPU: 2 PID: 154656 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627601] RIP: 0033:0x7fffffffe062 [21490834.627604] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.627605] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.627607] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.627608] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.627609] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.627610] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.627611] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.627611] FS: 000000c000464098 GS: 0000000000000000 [21490834.627942] CPU: 36 PID: 154347 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627949] RIP: 0033:0x7fffffffe062 [21490834.627954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633202] CPU: 3 PID: 154316 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.633203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.633206] RIP: 0033:0x7fffffffe062 [21490834.633210] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633211] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.633213] RAX: 0000000000026844 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.633214] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490834.633215] RBP: 000000c000767c80 R08: 000000c0003a6a60 R09: 0000000000000000 [21490834.633215] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490834.633217] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.633218] FS: 000000c000464098 GS: 0000000000000000 [21490834.999588] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490835.006608] RAX: 0000000000026843 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490835.015547] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490835.024448] RBP: 000000c000767c80 R08: 000000c0003a71e0 R09: 0000000000000000 [21490835.033396] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490835.042322] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490835.051256] FS: 000000c000464098 GS: 0000000000000000 [21490865.452258] exe[121095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f985b77ab9 cs:33 sp:7ea2c65fd858 ax:0 si:55f985bd1062 di:ffffffffff600000 [21491105.882045] exe[136321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e89ccab9 cs:33 sp:7f6927170ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.049563] exe[150088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3886ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.081031] exe[158268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3865ef8 ax:0 si:20000080 di:ffffffffff600000 [21491245.032012] potentially unexpected fatal signal 5. [21491245.037263] CPU: 40 PID: 165169 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491245.049284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491245.058916] RIP: 0033:0x7fffffffe062 [21491245.062891] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491245.082081] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21491245.087927] RAX: 000000000002877f RBX: 0000000000000000 RCX: 00007fffffffe05a [21491245.095557] RDX: 0000000000000000 RSI: 000000c00076c000 RDI: 0000000000012f00 [21491245.104486] RBP: 000000c00076bc80 R08: 000000c0003e82e0 R09: 0000000000000000 [21491245.113455] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00076bc70 [21491245.122411] R13: 000000c0005ff000 R14: 000000c0002afdc0 R15: 0000000000028510 [21491245.131372] FS: 0000000002207a30 GS: 0000000000000000 [21491989.343402] potentially unexpected fatal signal 5. [21491989.348631] CPU: 77 PID: 164449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491989.360657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491989.370302] RIP: 0033:0x7fffffffe062 [21491989.374361] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491989.394993] RSP: 002b:000000c000861be8 EFLAGS: 00000297 [21491989.401995] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21491989.410920] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21491989.419839] RBP: 000000c000861c80 R08: 0000000000000000 R09: 0000000000000000 [21491989.428811] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000861c70 [21491989.437750] R13: 000000c0005b3800 R14: 000000c000511c00 R15: 000000000001a0b1 [21491989.446677] FS: 000000c00013b098 GS: 0000000000000000 [21492010.033828] potentially unexpected fatal signal 5. [21492010.039043] CPU: 73 PID: 115671 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21492010.051022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21492010.060660] RIP: 0033:0x7fffffffe062 [21492010.064619] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21492010.083782] RSP: 002b:000000c00016db90 EFLAGS: 00000297 [21492010.089431] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21492010.096975] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21492010.105886] RBP: 000000c00016dc28 R08: 0000000000000000 R09: 0000000000000000 [21492010.114842] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00016dc18 [21492010.123774] R13: 000000c0001ca150 R14: 000000c00015e540 R15: 000000000001a4e0 [21492010.132747] FS: 000000c000514098 GS: 0000000000000000 [21492152.942086] exe[196851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8787e3237 cs:33 sp:7f8e5b50cef8 ax:2f700000 si:55f8788512f7 di:ffffffffff600000 [21492809.260242] exe[206167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599417c1ab9 cs:33 sp:7ea3893c7858 ax:0 si:55994181b062 di:ffffffffff600000 [21492914.481697] exe[221505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.598202] exe[223922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21492914.700778] exe[186763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.814989] exe[188027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21493264.451346] exe[227341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f7f09ab9 cs:33 sp:7fea169fe858 ax:0 si:5623f7f63097 di:ffffffffff600000 [21494007.945124] exe[174529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631e0fa0ab9 cs:33 sp:7f63cb883858 ax:0 si:5631e0ffa097 di:ffffffffff600000 [21494514.390535] exe[212079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56404ee78237 cs:33 sp:7f51d9dc9ef8 ax:2f700000 si:56404eee62f7 di:ffffffffff600000 [21494527.739704] exe[225308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d97b1fc237 cs:33 sp:7f0b1fdf3ef8 ax:2f700000 si:55d97b26a2f7 di:ffffffffff600000 [21494538.504725] exe[221884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f715148ab9 cs:33 sp:7ef8477d2ef8 ax:0 si:20004940 di:ffffffffff600000 [21494548.394718] exe[217787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fd0eab9 cs:33 sp:7f432a9f8858 ax:0 si:56083fd68062 di:ffffffffff600000 [21494577.077258] exe[169161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f37589237 cs:33 sp:7ee293e9def8 ax:2f700000 si:562f375f72f7 di:ffffffffff600000 [21494578.476567] exe[209634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617406de237 cs:33 sp:7fda97bfeef8 ax:2f700000 si:56174074c2f7 di:ffffffffff600000 [21494581.695838] exe[227772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64e71a237 cs:33 sp:7f6be1b38ef8 ax:2f700000 si:55e64e7882f7 di:ffffffffff600000 [21494589.646121] exe[193077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55931f2e0237 cs:33 sp:7f92962a3ef8 ax:2f700000 si:55931f34e2f7 di:ffffffffff600000 [21494621.488475] exe[235333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4b041237 cs:33 sp:7fc0a97b3ef8 ax:2f700000 si:55af4b0af2f7 di:ffffffffff600000 [21494645.728105] exe[238972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568b0a7a237 cs:33 sp:7fd8123d3ef8 ax:2f700000 si:5568b0ae82f7 di:ffffffffff600000 [21494662.421329] potentially unexpected fatal signal 5. [21494662.426575] CPU: 86 PID: 189964 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494662.438565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494662.448186] RIP: 0033:0x7fffffffe062 [21494662.452182] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494662.471368] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21494662.477036] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494662.485976] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055b70fa00000 [21494662.494938] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21494662.503887] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21494662.512802] R13: 000000c000181008 R14: 000000c0002656c0 R15: 000000000002d99e [21494662.521713] FS: 00007fc240e9a6c0 GS: 0000000000000000 [21494805.743597] exe[242795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564664bf4ab9 cs:33 sp:7ffa4f1dc858 ax:0 si:564664c4e062 di:ffffffffff600000 [21494840.320122] potentially unexpected fatal signal 5. [21494840.325367] CPU: 43 PID: 233570 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494840.337361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494840.347008] RIP: 0033:0x7fffffffe062 [21494840.351006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494840.370204] RSP: 002b:000000c0007a5be8 EFLAGS: 00000297 [21494840.377218] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494840.386144] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21494840.393705] RBP: 000000c0007a5c80 R08: 0000000000000000 R09: 0000000000000000 [21494840.402603] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007a5c70 [21494840.411542] R13: 000000c000199800 R14: 000000c00047b6c0 R15: 0000000000028511 [21494840.420445] FS: 000000c000180898 GS: 0000000000000000 [21494856.283674] potentially unexpected fatal signal 5. [21494856.288985] CPU: 22 PID: 246161 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494856.300995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494856.310640] RIP: 0033:0x7fffffffe062 [21494856.314670] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494856.333857] RSP: 002b:000000c000643be8 EFLAGS: 00000297 [21494856.339534] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494856.347078] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21494856.356003] RBP: 000000c000643c80 R08: 0000000000000000 R09: 0000000000000000 [21494856.363551] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000643c70 [21494856.371113] R13: 000000c0006ae000 R14: 000000c000007a40 R15: 000000000002895d [21494856.378683] FS: 000000c00013a898 GS: 0000000000000000 [21494946.053043] exe[244762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbe90cf237 cs:33 sp:7ee0afcaaef8 ax:2f700000 si:55bbe913d2f7 di:ffffffffff600000 [21495001.080336] exe[250600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556948fab237 cs:33 sp:7faba0fe3ef8 ax:2f700000 si:5569490192f7 di:ffffffffff600000 [21495111.333881] exe[245803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb11ed9237 cs:33 sp:7f4201c56ef8 ax:2f700000 si:55eb11f472f7 di:ffffffffff600000 [21495135.038108] exe[245251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55991c19c237 cs:33 sp:7f7acbfd1ef8 ax:2f700000 si:55991c20a2f7 di:ffffffffff600000 [21495261.221502] potentially unexpected fatal signal 5. [21495261.226738] CPU: 92 PID: 187739 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495261.238775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495261.248447] RIP: 0033:0x7fffffffe062 [21495261.252452] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495261.271712] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21495261.278749] RAX: 00007f3f106e6000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495261.286350] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007f3f106e6000 [21495261.295273] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000dd01000 [21495261.304224] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21495261.313181] R13: 000000c000143008 R14: 000000c0001c2540 R15: 000000000002c497 [21495261.322114] FS: 00007f4846f9e6c0 GS: 0000000000000000 [21495696.798639] exe[272470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55602feceab9 cs:33 sp:7fa61259c858 ax:0 si:55602ff28070 di:ffffffffff600000 [21495807.793812] exe[277195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560dfea10ab9 cs:33 sp:7fb8e14a7858 ax:0 si:560dfea6a062 di:ffffffffff600000 [21495859.206017] exe[269242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2eb029ab9 cs:33 sp:7f9e0c737858 ax:0 si:55e2eb083062 di:ffffffffff600000 [21495900.306105] exe[282613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555856171ab9 cs:33 sp:7ef787595ef8 ax:0 si:20000180 di:ffffffffff600000 [21495948.628952] potentially unexpected fatal signal 5. [21495948.634187] CPU: 78 PID: 284340 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495948.646165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495948.655804] RIP: 0033:0x7fffffffe062 [21495948.659786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495948.678991] RSP: 002b:000000c0006b9b90 EFLAGS: 00000297 [21495948.684644] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495948.692260] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21495948.701207] RBP: 000000c0006b9c28 R08: 0000000000000000 R09: 0000000000000000 [21495948.710174] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006b9c18 [21495948.719136] R13: 000000c000712a20 R14: 000000c000580540 R15: 00000000000453f5 [21495948.728086] FS: 000000c000180098 GS: 0000000000000000 [21495951.634698] potentially unexpected fatal signal 5. [21495951.639938] CPU: 4 PID: 262481 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495951.651855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495951.661550] RIP: 0033:0x7fffffffe062 [21495951.665590] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495951.686142] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21495951.691806] RAX: 0000562b78311000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495951.699367] RDX: 0000000000000003 RSI: 00000000000b9000 RDI: 0000562b78311000 [21495951.708304] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000016da9000 [21495951.717233] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21495951.726159] R13: 0000000002883b00 R14: 000000c000515880 R15: 000000000003fea9 [21495951.735029] FS: 00000000056753c0 GS: 0000000000000000 [21496357.635494] exe[291295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fb40dab9 cs:33 sp:7f2c99f1bef8 ax:0 si:20000380 di:ffffffffff600000 [21496773.775432] exe[269093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567a654bab9 cs:33 sp:7efe12a53858 ax:0 si:5567a65a5062 di:ffffffffff600000 [21497711.615530] exe[325492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c80668ab9 cs:33 sp:7fc5507feef8 ax:0 si:20007740 di:ffffffffff600000 [21498884.188513] exe[298244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c57b4237 cs:33 sp:7ff1d68b2ef8 ax:2f700000 si:55a1c58222f7 di:ffffffffff600000 [21499159.034146] exe[336402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a021e79237 cs:33 sp:7f9e62821ef8 ax:2f700000 si:55a021ee72f7 di:ffffffffff600000 [21499362.721968] potentially unexpected fatal signal 5. [21499362.725788] potentially unexpected fatal signal 11. [21499362.727195] CPU: 40 PID: 352189 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499362.732509] CPU: 59 PID: 352442 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499362.732511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499362.732517] RIP: 0033:0x556919d95851 [21499362.732519] Code: 24 10 00 00 00 44 8b 54 24 30 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 eb ae 66 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff eb ae e8 10 26 00 00 48 83 ec 58 48 89 4c [21499362.732520] RSP: 002b:00007f58fc16f4d0 EFLAGS: 00010213 [21499362.732522] RAX: 0000000000000002 RBX: 0000000000000005 RCX: 0000556919d95801 [21499362.732523] RDX: ffffffffffffffb0 RSI: 0000556919de145d RDI: 00000000ffffff9c [21499362.732523] RBP: 00007f58fc16f59c R08: 00000000001d859a R09: 0000000000000020 [21499362.732524] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 [21499362.732525] R13: 0000000000003a74 R14: 00000000000033f6 R15: 0000000000000003 [21499362.732525] FS: 000055691a9f4480 GS: 0000000000000000 [21499362.844006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499362.853681] RIP: 0033:0x7fffffffe062 [21499362.859060] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21499362.880250] RSP: 002b:000000c00078db90 EFLAGS: 00000297 [21499362.887251] RAX: 00000000000561f1 RBX: 0000000000000000 RCX: 00007fffffffe05a [21499362.896190] RDX: 0000000000000000 RSI: 000000c00078e000 RDI: 0000000000012f00 [21499362.905140] RBP: 000000c00078dc28 R08: 000000c0005925b0 R09: 0000000000000000 [21499362.914057] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00078dc18 [21499362.922967] R13: 000000c000167d70 R14: 000000c000503340 R15: 0000000000055f3e [21499362.931910] FS: 000000c00050e098 GS: 0000000000000000 [21499478.998984] potentially unexpected fatal signal 11. [21499479.004337] CPU: 19 PID: 356472 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499479.016322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499479.025982] RIP: 0033:0x5581640c265e [21499479.030007] Code: ff 0f 1f 00 8d 47 01 eb 16 0f 1f 00 48 83 c0 01 8b b4 85 5c 08 00 00 85 f6 0f 85 fd 00 00 00 89 c7 83 f8 04 75 e6 48 8b 4d 60 <48> 8b 41 08 48 83 e0 f8 48 39 85 88 08 00 00 0f 82 4a 02 00 00 48 [21499479.050628] RSP: 002b:00007fb15f2642f0 EFLAGS: 00010246 [21499479.057660] RAX: 0000000000000004 RBX: 0000000000008040 RCX: 0000558164d467d0 [21499479.066573] RDX: 00005581641e8e20 RSI: 0000000000000000 RDI: 0000000000000004 [21499479.075511] RBP: 00005581641e8660 R08: 0000000027b61aef R09: 0000000000000106 [21499479.084431] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [21499479.093382] R13: 0000000000000076 R14: 00005581641e86c0 R15: 0000000000000000 [21499479.102287] FS: 0000558164d45480 GS: 0000000000000000 [21500067.947218] exe[360672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597f507dab9 cs:33 sp:7f280f0ed858 ax:0 si:5597f50d7062 di:ffffffffff600000 [21500091.369223] exe[368292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e442a10237 cs:33 sp:7eacfc279ef8 ax:2f700000 si:55e442a7e2f7 di:ffffffffff600000 [21500249.092259] exe[375585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624b29caab9 cs:33 sp:7fbf0c646858 ax:0 si:5624b2a24070 di:ffffffffff600000 [21500405.363278] potentially unexpected fatal signal 11. [21500405.368587] CPU: 81 PID: 374121 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21500405.374080] potentially unexpected fatal signal 11. [21500405.380597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21500405.385864] CPU: 57 PID: 377504 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21500405.385866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21500405.385872] RIP: 0033:0x55fd89628a93 [21500405.385876] Code: 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 48 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 <48> c7 05 22 55 10 00 00 00 00 00 4c 8d 0d 7b 08 c6 00 0f 11 05 04 [21500405.395522] RIP: 0033:0x563889c380e9 [21500405.395527] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21500405.395528] RSP: 002b:00007f8b3f1a3448 EFLAGS: 00010213 [21500405.395530] RAX: 0000000000000016 RBX: 0000563889c823b9 RCX: 0000563889c380d7 [21500405.395531] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f8b3f1a45c0 [21500405.395532] RBP: 00007f8b3f1a459c R08: 000000000f0413e8 R09: 000000000000026e [21500405.395532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b3f1a45c0 [21500405.395533] R13: 0000563889c823b9 R14: 000000000004c776 R15: 0000000000000001 [21500405.395534] FS: 000056388a895480 GS: 0000000000000000 [21500405.529100] RSP: 002b:00007fd927012440 EFLAGS: 00010202 [21500405.536152] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055fd89628e0d [21500405.545078] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055fd8a28a760 [21500405.553984] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21500405.562918] R10: 000055fd8a28a750 R11: 0000000000000246 R12: 0000000000000000 [21500405.571816] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21500405.580751] FS: 000055fd8a28a480 GS: 0000000000000000 [21500435.878185] exe[353664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e9eb5cab9 cs:33 sp:7fad2ec44858 ax:0 si:559e9ebb6062 di:ffffffffff600000 [21500487.956671] potentially unexpected fatal signal 5. [21500487.961931] CPU: 36 PID: 384936 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21500487.973939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21500487.983580] RIP: 0033:0x7fffffffe062 [21500487.987600] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21500488.006854] RSP: 002b:000000c0006b9b90 EFLAGS: 00000297 [21500488.013846] RAX: 0000559a73e11000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21500488.021387] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000559a73e11000 [21500488.030340] RBP: 000000c0006b9c28 R08: 0000000000000009 R09: 0000000020877000 [21500488.039290] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006b9c18 [21500488.048283] R13: 000000c0006c2b10 R14: 000000c00058ac40 R15: 000000000005d55e [21500488.057216] FS: 0000000001f6c6b0 GS: 0000000000000000 [21500611.296905] potentially unexpected fatal signal 11. [21500611.302237] CPU: 22 PID: 394078 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21500611.314259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21500611.323925] RIP: 0033:0x7f676687320b [21500611.327931] Code: 48 89 16 48 69 d2 00 ca 9a 3b 49 29 d0 4c 89 46 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 48 89 fe 48 8d 0d f5 dd ff ff <48> 8b 39 83 e7 fe 48 8b 59 08 4c 8b 41 18 4c 8b 51 10 4c 8b 59 20 [21500611.348542] RSP: 002b:00007fd532ad32d0 EFLAGS: 00010202 [21500611.355550] RAX: 0000000000000002 RBX: 0000000000000003 RCX: 00007f6766871000 [21500611.364529] RDX: 0000001b2f220004 RSI: 00007fd532ad32f0 RDI: 00007fd532ad32f0 [21500611.373458] RBP: 0000000000000001 R08: 0000001b2f260000 R09: 0000000000000000 [21500611.382384] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21500611.391309] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21500611.400243] FS: 0000558e9bcda480 GS: 0000000000000000 [21501474.883765] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501476.114655] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501477.011934] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501478.427165] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501479.451469] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501480.173758] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501480.529279] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501480.809637] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501481.180481] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501481.648747] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501481.655485] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501482.138858] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501482.685945] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501482.739556] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501483.148371] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501485.417825] warn_bad_vsyscall: 5 callbacks suppressed [21501485.417828] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501485.768805] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501486.176234] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501486.645368] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501487.104434] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501488.108391] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501490.891980] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501491.365479] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501491.790708] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed33858 ax:0 si:55c606369070 di:ffffffffff600000 [21501492.220418] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501492.819695] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501492.819906] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501493.204763] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501493.717774] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501494.225650] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501494.746051] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501496.124772] warn_bad_vsyscall: 3 callbacks suppressed [21501496.124776] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501496.670371] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501496.718688] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501497.073326] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501497.578363] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501498.129033] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501498.590894] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501499.408408] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501499.831721] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501499.875318] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501501.158358] warn_bad_vsyscall: 1 callbacks suppressed [21501501.158363] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501502.081408] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501502.534467] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501503.025977] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501503.706053] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501504.183268] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501504.765495] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501505.175552] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501505.568827] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501505.576822] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501506.408519] warn_bad_vsyscall: 1 callbacks suppressed [21501506.408523] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501506.416705] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501506.809555] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501507.222761] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501508.038164] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501508.784757] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501509.107635] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501509.476111] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501509.950548] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501510.409862] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501512.075266] warn_bad_vsyscall: 2 callbacks suppressed [21501512.075270] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501512.852604] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501513.228622] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501513.270352] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501513.662098] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501514.117397] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501514.125520] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501514.539160] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501515.217675] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501515.619836] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501517.198521] warn_bad_vsyscall: 2 callbacks suppressed [21501517.198524] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501517.791383] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501518.549213] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501519.512278] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501519.870495] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501519.908684] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501519.944433] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501519.980169] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501520.017718] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501520.056135] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501522.385071] warn_bad_vsyscall: 61 callbacks suppressed [21501522.385075] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501522.788645] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501522.796878] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369097 di:ffffffffff600000 [21501523.209522] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501523.533107] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501523.902254] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501524.474074] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501525.356156] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501526.161302] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501526.657902] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501527.514599] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501527.948882] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501528.407511] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501528.799181] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501529.331513] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501529.381502] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501529.841462] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501530.193431] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501530.251440] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed33858 ax:0 si:55c606369097 di:ffffffffff600000 [21501530.602331] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501533.011909] warn_bad_vsyscall: 2 callbacks suppressed [21501533.011912] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501533.714571] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501534.221262] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501535.072711] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501535.123781] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501535.654136] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501536.222297] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501536.614798] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501537.109872] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501537.150536] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501538.194252] warn_bad_vsyscall: 3 callbacks suppressed [21501538.194255] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501538.447097] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501538.878745] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501539.236352] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501539.640093] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501539.647611] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501540.294869] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501540.839696] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369097 di:ffffffffff600000 [21501540.876328] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369097 di:ffffffffff600000 [21501540.915239] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369097 di:ffffffffff600000 [21501543.548299] warn_bad_vsyscall: 64 callbacks suppressed [21501543.548302] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501543.980568] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501544.370140] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501544.828063] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501545.199471] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501545.990863] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501546.464326] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501546.968288] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501547.004537] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501547.040071] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501548.962041] warn_bad_vsyscall: 32 callbacks suppressed [21501548.962044] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501549.360051] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501549.431264] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501549.991083] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501550.464689] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501550.891018] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501551.326026] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501552.093217] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501552.785396] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501553.171138] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501554.295360] warn_bad_vsyscall: 2 callbacks suppressed [21501554.295363] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501554.738157] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501554.802091] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501555.226020] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501556.444026] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501557.392516] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501557.758011] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501558.269720] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501558.741967] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501559.128089] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501560.134798] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501560.657886] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501561.061982] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501561.249050] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501561.511978] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501562.277972] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369097 di:ffffffffff600000 [21501563.056458] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501563.516792] exe[379115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d0a8eab9 cs:33 sp:7ef5f8496858 ax:0 si:5626d0ae8097 di:ffffffffff600000 [21501563.527599] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501563.612413] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501565.707650] warn_bad_vsyscall: 67 callbacks suppressed [21501565.707654] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501566.281869] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501567.358757] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501568.016400] exe[313282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501568.510626] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501568.927624] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501569.280869] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501569.938837] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501570.365204] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501570.797677] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501570.854825] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501571.655877] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501572.279485] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501572.348135] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501572.872070] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501573.292271] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501573.938344] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501574.763312] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501575.210304] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501576.410707] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501576.462947] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501576.835404] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501577.219683] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501577.778290] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501578.219587] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501578.610859] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501579.085392] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501579.135345] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501579.577565] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501581.783628] warn_bad_vsyscall: 3 callbacks suppressed [21501581.783632] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.407233] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.443538] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.480192] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.518136] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.555383] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.592656] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.626919] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.663594] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501582.702631] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501586.908645] warn_bad_vsyscall: 64 callbacks suppressed [21501586.908648] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501587.690751] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501588.165676] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501588.807810] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501589.611962] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501589.852366] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501590.196121] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369062 di:ffffffffff600000 [21501590.563509] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501590.924663] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501590.932582] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501591.939377] warn_bad_vsyscall: 1 callbacks suppressed [21501591.939380] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501591.955598] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed54858 ax:0 si:55c606369070 di:ffffffffff600000 [21501603.239337] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501608.945452] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501627.059881] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501628.841629] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501631.846977] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501655.435602] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369097 di:ffffffffff600000 [21501684.807492] potentially unexpected fatal signal 11. [21501684.812816] CPU: 15 PID: 401164 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21501684.824908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21501684.834542] RIP: 0033:0x562c6ae8ca93 [21501684.838529] Code: 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 48 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 <48> c7 05 22 55 10 00 00 00 00 00 4c 8d 0d 7b 08 c6 00 0f 11 05 04 [21501684.857737] RSP: 002b:00007f2158faf440 EFLAGS: 00010202 [21501684.863523] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000562c6ae8ce0d [21501684.871063] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000562c6baee760 [21501684.878625] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21501684.887552] R10: 0000562c6baee750 R11: 0000000000000246 R12: 0000000000000000 [21501684.895122] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21501684.902706] FS: 0000562c6baee480 GS: 0000000000000000 [21501693.963174] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369070 di:ffffffffff600000 [21501695.593435] exe[313868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c60630fab9 cs:33 sp:7f89bed75858 ax:0 si:55c606369062 di:ffffffffff600000 [21501700.992508] exe[400468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0e6fcb237 cs:33 sp:7f877406bef8 ax:2f700000 si:55c0e70392f7 di:ffffffffff600000 [21501747.647289] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501768.990884] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501783.036736] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415097 di:ffffffffff600000 [21501797.140922] exe[313281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501803.939193] exe[313470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415097 di:ffffffffff600000 [21501839.089147] exe[316083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501872.628161] exe[313299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415097 di:ffffffffff600000 [21501875.590396] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415062 di:ffffffffff600000 [21501894.925564] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415097 di:ffffffffff600000 [21501919.136307] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501919.472925] exe[313267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415070 di:ffffffffff600000 [21501924.249165] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbb93bbab9 cs:33 sp:7ff4c0b77858 ax:0 si:55bbb9415097 di:ffffffffff600000 [21501932.795123] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557730092ab9 cs:33 sp:7f6664aa0858 ax:0 si:5577300ec070 di:ffffffffff600000 [21501939.520839] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5d7b78ab9 cs:33 sp:7f0f83440858 ax:0 si:55f5d7bd2070 di:ffffffffff600000 [21501954.254776] exe[354976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5062 di:ffffffffff600000 [21501964.435977] exe[327948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5097 di:ffffffffff600000 [21502040.518214] exe[430326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c7baf237 cs:33 sp:7fab98535ef8 ax:2f700000 si:55a1c7c1d2f7 di:ffffffffff600000 [21502042.176855] exe[313287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5062 di:ffffffffff600000 [21502048.883822] exe[330281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5070 di:ffffffffff600000 [21502052.074927] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5070 di:ffffffffff600000 [21502052.484371] exe[313406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26348bab9 cs:33 sp:7fe6506ca858 ax:0 si:55a2634e5070 di:ffffffffff600000 [21502062.476239] exe[313277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2070 di:ffffffffff600000 [21502064.353860] exe[353666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db01620ab9 cs:33 sp:7f475813fef8 ax:0 si:20002b00 di:ffffffffff600000 [21502069.350519] exe[330115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2097 di:ffffffffff600000 [21502071.846017] exe[339797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2062 di:ffffffffff600000 [21502115.960074] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2070 di:ffffffffff600000 [21502157.924659] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2070 di:ffffffffff600000 [21502192.628448] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2070 di:ffffffffff600000 [21502215.023266] exe[315436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2070 di:ffffffffff600000 [21502246.135642] exe[313871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b4278ab9 cs:33 sp:7f41c7f24858 ax:0 si:5573b42d2097 di:ffffffffff600000 [21502258.619611] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570a9409ab9 cs:33 sp:7f88d6f64858 ax:0 si:5570a9463097 di:ffffffffff600000 [21502265.237735] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570a9409ab9 cs:33 sp:7f88d6f64858 ax:0 si:5570a9463097 di:ffffffffff600000 [21502298.573113] exe[313679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8716f9ab9 cs:33 sp:7f123d2fe858 ax:0 si:55a871753070 di:ffffffffff600000 [21502365.562005] exe[433109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557eb95ad237 cs:33 sp:7f6443397ef8 ax:2f700000 si:557eb961b2f7 di:ffffffffff600000 [21502368.486914] exe[403528] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d0ac6237 cs:33 sp:7ebd36696ef8 ax:2f700000 si:55e1d0b342f7 di:ffffffffff600000 [21502376.934984] exe[313295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ede047bab9 cs:33 sp:7f0dfbc72858 ax:0 si:55ede04d5070 di:ffffffffff600000 [21502377.591769] exe[313406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ede047bab9 cs:33 sp:7f0dfbc72858 ax:0 si:55ede04d5070 di:ffffffffff600000 [21502377.678711] exe[348965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563bcb48237 cs:33 sp:7f32ac09fef8 ax:2f700000 si:5563bcbb62f7 di:ffffffffff600000 [21502378.870136] exe[338342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558899293237 cs:33 sp:7f99b275bef8 ax:2f700000 si:5588993012f7 di:ffffffffff600000 [21502380.168712] exe[375008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dff76c237 cs:33 sp:7f548d1cfef8 ax:2f700000 si:562dff7da2f7 di:ffffffffff600000 [21502381.532454] exe[428905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c7baf237 cs:33 sp:7fab98535ef8 ax:2f700000 si:55a1c7c1d2f7 di:ffffffffff600000 [21502399.870940] exe[358674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d9187ab9 cs:33 sp:7fa9225bf858 ax:0 si:5587d91e1097 di:ffffffffff600000 [21502399.965214] exe[356809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564c2271ab9 cs:33 sp:7f469f4e1858 ax:0 si:5564c22cb097 di:ffffffffff600000 [21502400.071442] exe[365864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564c2271ab9 cs:33 sp:7f469f4c0858 ax:0 si:5564c22cb097 di:ffffffffff600000 [21502400.077546] exe[359388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ab9256ab9 cs:33 sp:7f90a27f7858 ax:0 si:555ab92b0097 di:ffffffffff600000 [21502400.214740] exe[356746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d9187ab9 cs:33 sp:7fa9225bf858 ax:0 si:5587d91e1097 di:ffffffffff600000 [21502400.358786] exe[358255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ab9256ab9 cs:33 sp:7f90a27f7858 ax:0 si:555ab92b0097 di:ffffffffff600000 [21502400.524389] exe[357007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d9187ab9 cs:33 sp:7fa9225bf858 ax:0 si:5587d91e1097 di:ffffffffff600000 [21502400.641784] exe[388555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ab9256ab9 cs:33 sp:7f90a27f7858 ax:0 si:555ab92b0062 di:ffffffffff600000 [21502403.431787] exe[313287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e062 di:ffffffffff600000 [21502408.807267] exe[316086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e062 di:ffffffffff600000 [21502453.017827] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e070 di:ffffffffff600000 [21502453.489010] exe[313282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e097 di:ffffffffff600000 [21502453.680036] exe[330106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e070 di:ffffffffff600000 [21502470.400422] exe[313401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b305444ab9 cs:33 sp:7f628c847858 ax:0 si:55b30549e097 di:ffffffffff600000