devMinor: 0}]} D0323 21:16:47.714519 249972 usertrap_amd64.go:212] [ 18279: 18279] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.714551 249972 usertrap_amd64.go:122] [ 18279: 18279] Allocate a new trap: 0xc008a22780 41 D0323 21:16:47.714564 249972 usertrap_amd64.go:225] [ 18279: 18279] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.720588 249972 usertrap_amd64.go:212] [ 18279: 18279] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.720621 249972 usertrap_amd64.go:122] [ 18279: 18279] Allocate a new trap: 0xc008a22780 42 D0323 21:16:47.720635 249972 usertrap_amd64.go:225] [ 18279: 18279] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.721165 249972 task_exit.go:204] [ 18279: 18279] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.721201 249972 task_exit.go:204] [ 18279: 18279] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.721246 249972 task_signals.go:204] [ 18279: 18280] Signal 18279, PID: 18280, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.721273 249972 task_exit.go:204] [ 18279: 18280] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.723144 249972 task_exit.go:204] [ 18279: 18280] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.723209 249972 task_exit.go:204] [ 18279: 18280] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.723233 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.723983 249972 task_exit.go:204] [ 18279: 18279] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.725603 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.725992 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8, 0x1}, 0x1c) D0323 21:16:47.736515 249972 usertrap_amd64.go:212] [ 18281: 18281] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.736567 249972 usertrap_amd64.go:122] [ 18281: 18281] Allocate a new trap: 0xc008faf380 39 D0323 21:16:47.736654 249972 usertrap_amd64.go:225] [ 18281: 18281] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.737330 249972 usertrap_amd64.go:212] [ 18281: 18281] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.737352 249972 usertrap_amd64.go:122] [ 18281: 18281] Allocate a new trap: 0xc008faf380 40 D0323 21:16:47.737362 249972 usertrap_amd64.go:225] [ 18281: 18281] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.737848 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.738049 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.741152 249972 usertrap_amd64.go:212] [ 18281: 18281] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.741179 249972 usertrap_amd64.go:122] [ 18281: 18281] Allocate a new trap: 0xc008faf380 41 D0323 21:16:47.741193 249972 usertrap_amd64.go:225] [ 18281: 18281] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.751297 249972 usertrap_amd64.go:212] [ 18281: 18281] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.751344 249972 usertrap_amd64.go:122] [ 18281: 18281] Allocate a new trap: 0xc008faf380 42 D0323 21:16:47.751363 249972 usertrap_amd64.go:225] [ 18281: 18281] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.751923 249972 task_exit.go:204] [ 18281: 18281] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.751991 249972 task_exit.go:204] [ 18281: 18281] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.752823 249972 task_signals.go:204] [ 18281: 18282] Signal 18281, PID: 18282, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.752858 249972 task_exit.go:204] [ 18281: 18282] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.754115 249972 task_exit.go:204] [ 18281: 18282] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.754151 249972 task_exit.go:204] [ 18281: 18282] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.754166 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.754926 249972 task_exit.go:204] [ 18281: 18281] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) D0323 21:16:47.757792 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.757953 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.770567 249972 usertrap_amd64.go:212] [ 18283: 18283] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.770604 249972 usertrap_amd64.go:122] [ 18283: 18283] Allocate a new trap: 0xc0005cbe90 39 D0323 21:16:47.770735 249972 usertrap_amd64.go:225] [ 18283: 18283] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.772260 249972 usertrap_amd64.go:212] [ 18283: 18283] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.772288 249972 usertrap_amd64.go:122] [ 18283: 18283] Allocate a new trap: 0xc0005cbe90 40 D0323 21:16:47.772301 249972 usertrap_amd64.go:225] [ 18283: 18283] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.773082 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.773296 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.777744 249972 usertrap_amd64.go:212] [ 18283: 18283] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.777775 249972 usertrap_amd64.go:122] [ 18283: 18283] Allocate a new trap: 0xc0005cbe90 41 D0323 21:16:47.777789 249972 usertrap_amd64.go:225] [ 18283: 18283] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.788542 249972 usertrap_amd64.go:212] [ 18283: 18283] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.788574 249972 usertrap_amd64.go:122] [ 18283: 18283] Allocate a new trap: 0xc0005cbe90 42 D0323 21:16:47.788591 249972 usertrap_amd64.go:225] [ 18283: 18283] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.789078 249972 task_exit.go:204] [ 18283: 18283] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.789119 249972 task_exit.go:204] [ 18283: 18283] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.789206 249972 task_signals.go:204] [ 18283: 18284] Signal 18283, PID: 18284, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.789261 249972 task_exit.go:204] [ 18283: 18284] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.791892 249972 task_exit.go:204] [ 18283: 18284] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.792005 249972 task_exit.go:204] [ 18283: 18284] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.792037 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.792549 249972 task_exit.go:204] [ 18283: 18283] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: r0 = socket(0xa, 0x3, 0x1) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000100)='\b', 0x1}], 0x1, &(0x7f0000000580)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x30}, 0x4000044) D0323 21:16:47.797641 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.798322 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.811470 249972 usertrap_amd64.go:212] [ 18285: 18285] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.811526 249972 usertrap_amd64.go:122] [ 18285: 18285] Allocate a new trap: 0xc008a22ae0 39 D0323 21:16:47.811612 249972 usertrap_amd64.go:225] [ 18285: 18285] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.812371 249972 usertrap_amd64.go:212] [ 18285: 18285] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.812404 249972 usertrap_amd64.go:122] [ 18285: 18285] Allocate a new trap: 0xc008a22ae0 40 D0323 21:16:47.812421 249972 usertrap_amd64.go:225] [ 18285: 18285] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.813706 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.813928 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.818157 249972 usertrap_amd64.go:212] [ 18285: 18285] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.818211 249972 usertrap_amd64.go:122] [ 18285: 18285] Allocate a new trap: 0xc008a22ae0 41 D0323 21:16:47.818234 249972 usertrap_amd64.go:225] [ 18285: 18285] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.829046 249972 usertrap_amd64.go:212] [ 18285: 18285] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.829088 249972 usertrap_amd64.go:122] [ 18285: 18285] Allocate a new trap: 0xc008a22ae0 42 D0323 21:16:47.829104 249972 usertrap_amd64.go:225] [ 18285: 18285] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.829658 249972 task_exit.go:204] [ 18285: 18285] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.829753 249972 task_exit.go:204] [ 18285: 18285] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.829856 249972 task_signals.go:204] [ 18285: 18286] Signal 18285, PID: 18286, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.829892 249972 task_exit.go:204] [ 18285: 18286] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.831565 249972 task_exit.go:204] [ 18285: 18286] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.831602 249972 task_exit.go:204] [ 18285: 18286] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.831624 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.832647 249972 task_exit.go:204] [ 18285: 18285] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: mknod(&(0x7f0000000080)='./file0\x00', 0x80008005, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) D0323 21:16:47.842038 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.842242 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.850975 249972 usertrap_amd64.go:212] [ 18287: 18287] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.851013 249972 usertrap_amd64.go:122] [ 18287: 18287] Allocate a new trap: 0xc00307eed0 39 D0323 21:16:47.851119 249972 usertrap_amd64.go:225] [ 18287: 18287] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.851895 249972 usertrap_amd64.go:212] [ 18287: 18287] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.851923 249972 usertrap_amd64.go:122] [ 18287: 18287] Allocate a new trap: 0xc00307eed0 40 D0323 21:16:47.851932 249972 usertrap_amd64.go:225] [ 18287: 18287] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.852580 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.852748 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.859208 249972 usertrap_amd64.go:212] [ 18287: 18287] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.859241 249972 usertrap_amd64.go:122] [ 18287: 18287] Allocate a new trap: 0xc00307eed0 41 D0323 21:16:47.859253 249972 usertrap_amd64.go:225] [ 18287: 18287] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.870687 249972 usertrap_amd64.go:212] [ 18287: 18287] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.870726 249972 usertrap_amd64.go:122] [ 18287: 18287] Allocate a new trap: 0xc00307eed0 42 D0323 21:16:47.870742 249972 usertrap_amd64.go:225] [ 18287: 18287] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.871166 249972 task_exit.go:204] [ 18287: 18287] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.871205 249972 task_exit.go:204] [ 18287: 18287] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.871276 249972 task_signals.go:204] [ 18287: 18288] Signal 18287, PID: 18288, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.871316 249972 task_exit.go:204] [ 18287: 18288] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.873132 249972 task_exit.go:204] [ 18287: 18288] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.873159 249972 task_exit.go:204] [ 18287: 18288] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.873174 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.874495 249972 task_exit.go:204] [ 18287: 18287] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000000540)={0x4c, 0x13, 0x1, 0x0, 0x0, "", [@generic="3855e3067d13cef333069f58fec1b6ae1228a9eba0d31e5d6ebdf43bc105ed529095a9c1fbf8a65fc400bed8f0d7aec0273c60011a047a7e36"]}, 0x4c}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) D0323 21:16:47.876772 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.876994 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.885346 249972 usertrap_amd64.go:212] [ 18289: 18289] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.885381 249972 usertrap_amd64.go:122] [ 18289: 18289] Allocate a new trap: 0xc008a22cf0 39 D0323 21:16:47.885480 249972 usertrap_amd64.go:225] [ 18289: 18289] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.886130 249972 usertrap_amd64.go:212] [ 18289: 18289] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.886171 249972 usertrap_amd64.go:122] [ 18289: 18289] Allocate a new trap: 0xc008a22cf0 40 D0323 21:16:47.886188 249972 usertrap_amd64.go:225] [ 18289: 18289] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.886609 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.886823 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.889467 249972 usertrap_amd64.go:212] [ 18289: 18289] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.889492 249972 usertrap_amd64.go:122] [ 18289: 18289] Allocate a new trap: 0xc008a22cf0 41 D0323 21:16:47.889505 249972 usertrap_amd64.go:225] [ 18289: 18289] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.901993 249972 usertrap_amd64.go:212] [ 18289: 18289] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.902043 249972 usertrap_amd64.go:122] [ 18289: 18289] Allocate a new trap: 0xc008a22cf0 42 D0323 21:16:47.902060 249972 usertrap_amd64.go:225] [ 18289: 18289] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.903163 249972 task_exit.go:204] [ 18289: 18289] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.903210 249972 task_exit.go:204] [ 18289: 18289] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.903212 249972 task_signals.go:204] [ 18289: 18290] Signal 18289, PID: 18290, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.903236 249972 task_exit.go:204] [ 18289: 18290] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.905723 249972 task_exit.go:204] [ 18289: 18290] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.905768 249972 task_exit.go:204] [ 18289: 18290] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.905781 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.908503 249972 task_exit.go:204] [ 18289: 18289] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r1, 0x5423, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "ebeed70000000002000000960000000800"}) D0323 21:16:47.913681 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.913908 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.928655 249972 usertrap_amd64.go:212] [ 18291: 18291] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.928688 249972 usertrap_amd64.go:122] [ 18291: 18291] Allocate a new trap: 0xc008a22ed0 39 D0323 21:16:47.928780 249972 usertrap_amd64.go:225] [ 18291: 18291] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.930002 249972 usertrap_amd64.go:212] [ 18291: 18291] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.930029 249972 usertrap_amd64.go:122] [ 18291: 18291] Allocate a new trap: 0xc008a22ed0 40 D0323 21:16:47.930039 249972 usertrap_amd64.go:225] [ 18291: 18291] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.935146 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.935362 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.938289 249972 usertrap_amd64.go:212] [ 18291: 18291] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.938315 249972 usertrap_amd64.go:122] [ 18291: 18291] Allocate a new trap: 0xc008a22ed0 41 D0323 21:16:47.938328 249972 usertrap_amd64.go:225] [ 18291: 18291] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.946774 249972 usertrap_amd64.go:212] [ 18291: 18292] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:47.946812 249972 usertrap_amd64.go:122] [ 18291: 18292] Allocate a new trap: 0xc008a22ed0 42 D0323 21:16:47.946826 249972 usertrap_amd64.go:225] [ 18291: 18292] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.947251 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.947925 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.951546 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.951704 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.953339 249972 usertrap_amd64.go:212] [ 18291: 18291] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.953368 249972 usertrap_amd64.go:122] [ 18291: 18291] Allocate a new trap: 0xc008a22ed0 43 D0323 21:16:47.953391 249972 usertrap_amd64.go:225] [ 18291: 18291] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:47.953885 249972 task_exit.go:204] [ 18291: 18291] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.953949 249972 task_exit.go:204] [ 18291: 18291] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.954054 249972 task_signals.go:204] [ 18291: 18292] Signal 18291, PID: 18292, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.954093 249972 task_exit.go:204] [ 18291: 18292] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.955943 249972 task_exit.go:204] [ 18291: 18292] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.955971 249972 task_exit.go:204] [ 18291: 18292] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.955984 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.956542 249972 task_exit.go:204] [ 18291: 18291] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) D0323 21:16:47.962038 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.962180 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.971204 249972 usertrap_amd64.go:212] [ 18293: 18293] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.971288 249972 usertrap_amd64.go:122] [ 18293: 18293] Allocate a new trap: 0xc0046383f0 39 D0323 21:16:47.971384 249972 usertrap_amd64.go:225] [ 18293: 18293] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:47.971866 249972 usertrap_amd64.go:212] [ 18293: 18293] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:47.971883 249972 usertrap_amd64.go:122] [ 18293: 18293] Allocate a new trap: 0xc0046383f0 40 D0323 21:16:47.971892 249972 usertrap_amd64.go:225] [ 18293: 18293] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:47.972199 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:47.972369 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.975223 249972 usertrap_amd64.go:212] [ 18293: 18293] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:47.975250 249972 usertrap_amd64.go:122] [ 18293: 18293] Allocate a new trap: 0xc0046383f0 41 D0323 21:16:47.975263 249972 usertrap_amd64.go:225] [ 18293: 18293] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:47.982136 249972 usertrap_amd64.go:212] [ 18293: 18293] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:47.982168 249972 usertrap_amd64.go:122] [ 18293: 18293] Allocate a new trap: 0xc0046383f0 42 D0323 21:16:47.982182 249972 usertrap_amd64.go:225] [ 18293: 18293] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:47.982504 249972 task_exit.go:204] [ 18293: 18293] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.982549 249972 task_exit.go:204] [ 18293: 18293] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.982616 249972 task_signals.go:204] [ 18293: 18294] Signal 18293, PID: 18294, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:47.982643 249972 task_exit.go:204] [ 18293: 18294] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:47.984098 249972 task_exit.go:204] [ 18293: 18294] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:47.984131 249972 task_exit.go:204] [ 18293: 18294] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:47.984152 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:47.985666 249972 task_exit.go:204] [ 18293: 18293] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:47 executing program 0: socket$inet6_tcp(0xb, 0x2, 0x3) D0323 21:16:47.987617 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:47.987796 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:47.998894 249972 usertrap_amd64.go:212] [ 18295: 18295] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:47.998936 249972 usertrap_amd64.go:122] [ 18295: 18295] Allocate a new trap: 0xc008faf620 39 D0323 21:16:47.999035 249972 usertrap_amd64.go:225] [ 18295: 18295] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.000693 249972 usertrap_amd64.go:212] [ 18295: 18295] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.000730 249972 usertrap_amd64.go:122] [ 18295: 18295] Allocate a new trap: 0xc008faf620 40 D0323 21:16:48.000748 249972 usertrap_amd64.go:225] [ 18295: 18295] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.001815 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.002116 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.005620 249972 usertrap_amd64.go:212] [ 18295: 18295] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.005644 249972 usertrap_amd64.go:122] [ 18295: 18295] Allocate a new trap: 0xc008faf620 41 D0323 21:16:48.005661 249972 usertrap_amd64.go:225] [ 18295: 18295] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.016400 249972 usertrap_amd64.go:212] [ 18295: 18295] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.016434 249972 usertrap_amd64.go:122] [ 18295: 18295] Allocate a new trap: 0xc008faf620 42 D0323 21:16:48.016457 249972 usertrap_amd64.go:225] [ 18295: 18295] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.016993 249972 task_exit.go:204] [ 18295: 18295] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.017026 249972 task_exit.go:204] [ 18295: 18295] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.017111 249972 task_signals.go:204] [ 18295: 18296] Signal 18295, PID: 18296, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.017146 249972 task_exit.go:204] [ 18295: 18296] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.021420 249972 task_exit.go:204] [ 18295: 18296] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.021503 249972 task_exit.go:204] [ 18295: 18296] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.021520 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.022784 249972 task_exit.go:204] [ 18295: 18295] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: get_mempolicy(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2) D0323 21:16:48.024469 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.024651 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.035952 249972 usertrap_amd64.go:212] [ 18297: 18297] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.035978 249972 usertrap_amd64.go:122] [ 18297: 18297] Allocate a new trap: 0xc007faab70 39 D0323 21:16:48.036082 249972 usertrap_amd64.go:225] [ 18297: 18297] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.037228 249972 usertrap_amd64.go:212] [ 18297: 18297] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.037263 249972 usertrap_amd64.go:122] [ 18297: 18297] Allocate a new trap: 0xc007faab70 40 D0323 21:16:48.037285 249972 usertrap_amd64.go:225] [ 18297: 18297] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.037906 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.038371 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.041386 249972 usertrap_amd64.go:212] [ 18297: 18297] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.041410 249972 usertrap_amd64.go:122] [ 18297: 18297] Allocate a new trap: 0xc007faab70 41 D0323 21:16:48.041424 249972 usertrap_amd64.go:225] [ 18297: 18297] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.047244 249972 usertrap_amd64.go:212] [ 18297: 18297] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.047275 249972 usertrap_amd64.go:122] [ 18297: 18297] Allocate a new trap: 0xc007faab70 42 D0323 21:16:48.047288 249972 usertrap_amd64.go:225] [ 18297: 18297] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.047821 249972 task_exit.go:204] [ 18297: 18297] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.047853 249972 task_exit.go:204] [ 18297: 18297] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.047878 249972 task_signals.go:204] [ 18297: 18298] Signal 18297, PID: 18298, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.047909 249972 task_exit.go:204] [ 18297: 18298] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.049841 249972 task_exit.go:204] [ 18297: 18298] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.049869 249972 task_exit.go:204] [ 18297: 18298] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.049889 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.050047 249972 task_exit.go:204] [ 18297: 18297] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: mknod(&(0x7f0000000080)='./file0\x00', 0x80008005, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) poll(&(0x7f0000000180)=[{r0, 0x1}], 0x1, 0x0) D0323 21:16:48.052325 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.052518 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.060131 249972 usertrap_amd64.go:212] [ 18299: 18299] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.060158 249972 usertrap_amd64.go:122] [ 18299: 18299] Allocate a new trap: 0xc008faf890 39 D0323 21:16:48.060222 249972 usertrap_amd64.go:225] [ 18299: 18299] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.060687 249972 usertrap_amd64.go:212] [ 18299: 18299] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.060712 249972 usertrap_amd64.go:122] [ 18299: 18299] Allocate a new trap: 0xc008faf890 40 D0323 21:16:48.060724 249972 usertrap_amd64.go:225] [ 18299: 18299] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.063512 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.063727 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.066431 249972 usertrap_amd64.go:212] [ 18299: 18299] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.066460 249972 usertrap_amd64.go:122] [ 18299: 18299] Allocate a new trap: 0xc008faf890 41 D0323 21:16:48.066473 249972 usertrap_amd64.go:225] [ 18299: 18299] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.077812 249972 usertrap_amd64.go:212] [ 18299: 18299] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.077843 249972 usertrap_amd64.go:122] [ 18299: 18299] Allocate a new trap: 0xc008faf890 42 D0323 21:16:48.077857 249972 usertrap_amd64.go:225] [ 18299: 18299] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.078297 249972 task_exit.go:204] [ 18299: 18299] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.078338 249972 task_exit.go:204] [ 18299: 18299] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.078469 249972 task_signals.go:204] [ 18299: 18300] Signal 18299, PID: 18300, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.078507 249972 task_exit.go:204] [ 18299: 18300] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.079808 249972 task_exit.go:204] [ 18299: 18300] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.079837 249972 task_exit.go:204] [ 18299: 18300] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.079855 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.080807 249972 task_exit.go:204] [ 18299: 18299] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @private0}}) D0323 21:16:48.085023 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.085175 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.094355 249972 usertrap_amd64.go:212] [ 18301: 18301] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.094374 249972 usertrap_amd64.go:122] [ 18301: 18301] Allocate a new trap: 0xc00bba59b0 39 D0323 21:16:48.094511 249972 usertrap_amd64.go:225] [ 18301: 18301] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.095954 249972 usertrap_amd64.go:212] [ 18301: 18301] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.095979 249972 usertrap_amd64.go:122] [ 18301: 18301] Allocate a new trap: 0xc00bba59b0 40 D0323 21:16:48.095989 249972 usertrap_amd64.go:225] [ 18301: 18301] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.096573 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.097229 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.101021 249972 usertrap_amd64.go:212] [ 18301: 18301] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.101044 249972 usertrap_amd64.go:122] [ 18301: 18301] Allocate a new trap: 0xc00bba59b0 41 D0323 21:16:48.101054 249972 usertrap_amd64.go:225] [ 18301: 18301] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.109836 249972 usertrap_amd64.go:212] [ 18301: 18301] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.109856 249972 usertrap_amd64.go:122] [ 18301: 18301] Allocate a new trap: 0xc00bba59b0 42 D0323 21:16:48.109868 249972 usertrap_amd64.go:225] [ 18301: 18301] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.110287 249972 task_exit.go:204] [ 18301: 18301] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.110314 249972 task_exit.go:204] [ 18301: 18301] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.110379 249972 task_signals.go:204] [ 18301: 18302] Signal 18301, PID: 18302, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.110402 249972 task_exit.go:204] [ 18301: 18302] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.111839 249972 task_exit.go:204] [ 18301: 18302] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.111874 249972 task_exit.go:204] [ 18301: 18302] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.111887 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.113113 249972 task_exit.go:204] [ 18301: 18301] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000003400)=""/4096, &(0x7f00000000c0)=0x1000) D0323 21:16:48.114422 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.114564 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.121822 249972 usertrap_amd64.go:212] [ 18303: 18303] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.121933 249972 usertrap_amd64.go:122] [ 18303: 18303] Allocate a new trap: 0xc007e6fd40 39 D0323 21:16:48.122146 249972 usertrap_amd64.go:225] [ 18303: 18303] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.123023 249972 usertrap_amd64.go:212] [ 18303: 18303] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.123047 249972 usertrap_amd64.go:122] [ 18303: 18303] Allocate a new trap: 0xc007e6fd40 40 D0323 21:16:48.123057 249972 usertrap_amd64.go:225] [ 18303: 18303] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.123477 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.123630 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.127242 249972 usertrap_amd64.go:212] [ 18303: 18303] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.127271 249972 usertrap_amd64.go:122] [ 18303: 18303] Allocate a new trap: 0xc007e6fd40 41 D0323 21:16:48.127281 249972 usertrap_amd64.go:225] [ 18303: 18303] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.135023 249972 usertrap_amd64.go:212] [ 18303: 18303] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.135052 249972 usertrap_amd64.go:122] [ 18303: 18303] Allocate a new trap: 0xc007e6fd40 42 D0323 21:16:48.135064 249972 usertrap_amd64.go:225] [ 18303: 18303] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.135454 249972 task_exit.go:204] [ 18303: 18303] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.135489 249972 task_exit.go:204] [ 18303: 18303] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.136333 249972 task_signals.go:204] [ 18303: 18304] Signal 18303, PID: 18304, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.136360 249972 task_exit.go:204] [ 18303: 18304] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.138568 249972 task_exit.go:204] [ 18303: 18304] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.138592 249972 task_exit.go:204] [ 18303: 18304] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.138602 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.140107 249972 task_exit.go:204] [ 18303: 18303] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x52) write(r1, 0x0, 0x0) D0323 21:16:48.142304 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.142440 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.150247 249972 usertrap_amd64.go:212] [ 18305: 18305] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.150276 249972 usertrap_amd64.go:122] [ 18305: 18305] Allocate a new trap: 0xc0090740f0 39 D0323 21:16:48.150352 249972 usertrap_amd64.go:225] [ 18305: 18305] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.150792 249972 usertrap_amd64.go:212] [ 18305: 18305] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.150824 249972 usertrap_amd64.go:122] [ 18305: 18305] Allocate a new trap: 0xc0090740f0 40 D0323 21:16:48.150834 249972 usertrap_amd64.go:225] [ 18305: 18305] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.151203 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.151520 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.154275 249972 usertrap_amd64.go:212] [ 18305: 18305] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.154298 249972 usertrap_amd64.go:122] [ 18305: 18305] Allocate a new trap: 0xc0090740f0 41 D0323 21:16:48.154309 249972 usertrap_amd64.go:225] [ 18305: 18305] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.166719 249972 usertrap_amd64.go:212] [ 18305: 18305] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.166768 249972 usertrap_amd64.go:122] [ 18305: 18305] Allocate a new trap: 0xc0090740f0 42 D0323 21:16:48.166784 249972 usertrap_amd64.go:225] [ 18305: 18305] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.167445 249972 task_exit.go:204] [ 18305: 18305] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.167498 249972 task_exit.go:204] [ 18305: 18305] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.167573 249972 task_signals.go:204] [ 18305: 18306] Signal 18305, PID: 18306, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.167629 249972 task_exit.go:204] [ 18305: 18306] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.169479 249972 task_exit.go:204] [ 18305: 18306] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.169601 249972 task_exit.go:204] [ 18305: 18306] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.169630 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.170819 249972 task_exit.go:204] [ 18305: 18305] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "7e734119a6c7c64d77292b471fb840d47de331fd8c3c8652886ed2ed32d8dd1e13bca12da9eb6de9b1370bde3291ba6cea8eed777ffbcc03a4141dd90c4d47f6"}, 0x48, r0) keyctl$search(0xa, r1, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0) D0323 21:16:48.172160 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.172292 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.181691 249972 usertrap_amd64.go:212] [ 18307: 18307] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.181722 249972 usertrap_amd64.go:122] [ 18307: 18307] Allocate a new trap: 0xc008a23320 39 D0323 21:16:48.181813 249972 usertrap_amd64.go:225] [ 18307: 18307] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.182234 249972 usertrap_amd64.go:212] [ 18307: 18307] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.182255 249972 usertrap_amd64.go:122] [ 18307: 18307] Allocate a new trap: 0xc008a23320 40 D0323 21:16:48.182263 249972 usertrap_amd64.go:225] [ 18307: 18307] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.182654 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.182870 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.185551 249972 usertrap_amd64.go:212] [ 18307: 18307] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.185584 249972 usertrap_amd64.go:122] [ 18307: 18307] Allocate a new trap: 0xc008a23320 41 D0323 21:16:48.185600 249972 usertrap_amd64.go:225] [ 18307: 18307] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.192800 249972 usertrap_amd64.go:212] [ 18307: 18307] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.192830 249972 usertrap_amd64.go:122] [ 18307: 18307] Allocate a new trap: 0xc008a23320 42 D0323 21:16:48.192845 249972 usertrap_amd64.go:225] [ 18307: 18307] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.193205 249972 task_exit.go:204] [ 18307: 18307] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.193234 249972 task_exit.go:204] [ 18307: 18307] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.193316 249972 task_signals.go:204] [ 18307: 18308] Signal 18307, PID: 18308, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.193345 249972 task_exit.go:204] [ 18307: 18308] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.194768 249972 task_exit.go:204] [ 18307: 18308] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.194804 249972 task_exit.go:204] [ 18307: 18308] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.194820 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.195659 249972 task_exit.go:204] [ 18307: 18307] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) D0323 21:16:48.197721 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.197930 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.209776 249972 usertrap_amd64.go:212] [ 18309: 18309] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.209815 249972 usertrap_amd64.go:122] [ 18309: 18309] Allocate a new trap: 0xc008a23440 39 D0323 21:16:48.209886 249972 usertrap_amd64.go:225] [ 18309: 18309] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.210440 249972 usertrap_amd64.go:212] [ 18309: 18309] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.210465 249972 usertrap_amd64.go:122] [ 18309: 18309] Allocate a new trap: 0xc008a23440 40 D0323 21:16:48.210476 249972 usertrap_amd64.go:225] [ 18309: 18309] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.211082 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.211337 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.213782 249972 usertrap_amd64.go:212] [ 18309: 18309] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.213807 249972 usertrap_amd64.go:122] [ 18309: 18309] Allocate a new trap: 0xc008a23440 41 D0323 21:16:48.213819 249972 usertrap_amd64.go:225] [ 18309: 18309] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.221414 249972 usertrap_amd64.go:212] [ 18309: 18310] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:48.221435 249972 usertrap_amd64.go:122] [ 18309: 18310] Allocate a new trap: 0xc008a23440 42 D0323 21:16:48.221445 249972 usertrap_amd64.go:225] [ 18309: 18310] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.221970 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.222151 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.224418 249972 usertrap_amd64.go:212] [ 18309: 18309] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.224482 249972 usertrap_amd64.go:122] [ 18309: 18309] Allocate a new trap: 0xc008a23440 43 D0323 21:16:48.224498 249972 usertrap_amd64.go:225] [ 18309: 18309] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:48.224811 249972 task_exit.go:204] [ 18309: 18309] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.224840 249972 task_exit.go:204] [ 18309: 18309] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.224974 249972 task_signals.go:204] [ 18309: 18310] Signal 18309, PID: 18310, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.225018 249972 task_exit.go:204] [ 18309: 18310] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.226355 249972 task_exit.go:204] [ 18309: 18310] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.226393 249972 task_exit.go:204] [ 18309: 18310] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.226414 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.227499 249972 task_exit.go:204] [ 18309: 18309] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) syz_clone(0x0, &(0x7f0000000040)="bcf8aeb3c165312b6475091d32decce69a28c4d9c20fc24576eb9d50b9809a27e5d5682aeebcd464b97e5adce1bc9e942eda91f1d62c9d9c735396036189c1c6fc646c8023e4be40391cfcbf0c9031e6c4b6e0e93fe5713a3664ded179d1e437481a", 0x62, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d61120abab57ca5675acc4471383b8f65310e32aaf17d19ec06236c4aecd319a9468094c8293aa34dfa88f7caceedf4c") ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000001c0)) r0 = syz_clone(0x40100080, &(0x7f0000000440)="4bd690d0a2e2cb5cd6ce8f9b36e34b746a9f0dafd85261e8393b0e7064df370c49c37a035a87b11a2265e25da1ad3e2dd20805c8308da54c65cb1a4408eb0f0db46bdcd2546b9f9801bba69809d3ce990a28000f316e8c45034c6cb6fc71742275d971dfc93c23231e842aaa9d0e34c2100b6fcb8bec085e13d673a2ced862df0099426a1650b9c3a793c5b34c65f92d026932bf4bffff2de4471f350302c3e76005a761d3cafed2c4d24e679299b5cad3cb7cfe9f45305412114124b6c56aa3876f2fcd8920e601078348b49924", 0xce, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000540)="eccefacfa2ee0d89c7ac2bfc1104708fb0143dfd0d36") getpgrp(r0) D0323 21:16:48.230310 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.230429 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.238911 249972 usertrap_amd64.go:212] [ 18311: 18311] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.238940 249972 usertrap_amd64.go:122] [ 18311: 18311] Allocate a new trap: 0xc0090746c0 39 D0323 21:16:48.239033 249972 usertrap_amd64.go:225] [ 18311: 18311] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.239554 249972 usertrap_amd64.go:212] [ 18311: 18311] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.239585 249972 usertrap_amd64.go:122] [ 18311: 18311] Allocate a new trap: 0xc0090746c0 40 D0323 21:16:48.239598 249972 usertrap_amd64.go:225] [ 18311: 18311] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.240040 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.240199 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.242517 249972 usertrap_amd64.go:212] [ 18311: 18311] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.242545 249972 usertrap_amd64.go:122] [ 18311: 18311] Allocate a new trap: 0xc0090746c0 41 D0323 21:16:48.242557 249972 usertrap_amd64.go:225] [ 18311: 18311] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.255221 249972 task_run.go:312] [ 18313: 18313] Unhandled user fault: addr=1a48 ip=1a48 access=r-x sig=11 err=bad address D0323 21:16:48.255314 249972 task_log.go:87] [ 18313: 18313] Registers: D0323 21:16:48.255346 249972 task_log.go:94] [ 18313: 18313] Cs = 0000000000000033 D0323 21:16:48.255355 249972 task_log.go:94] [ 18313: 18313] Ds = 0000000000000000 D0323 21:16:48.255362 249972 task_log.go:94] [ 18313: 18313] Eflags = 0000000000010217 D0323 21:16:48.255368 249972 task_log.go:94] [ 18313: 18313] Es = 0000000000000000 D0323 21:16:48.255414 249972 task_log.go:94] [ 18313: 18313] Fs = 0000000000000000 D0323 21:16:48.255421 249972 task_log.go:94] [ 18313: 18313] Fs_base = 00007ea5f7236700 D0323 21:16:48.255427 249972 task_log.go:94] [ 18313: 18313] Gs = 0000000000000000 D0323 21:16:48.255434 249972 task_log.go:94] [ 18313: 18313] Gs_base = 00007fa97abef000 D0323 21:16:48.255440 249972 task_log.go:94] [ 18313: 18313] Orig_rax = ffffffffffffffff D0323 21:16:48.255453 249972 task_log.go:94] [ 18313: 18313] R10 = 0000000020000140 D0323 21:16:48.255459 249972 task_log.go:94] [ 18313: 18313] R11 = 0000000000000246 D0323 21:16:48.255485 249972 task_log.go:94] [ 18313: 18313] R12 = 0000000000000000 D0323 21:16:48.255491 249972 task_log.go:94] [ 18313: 18313] R13 = 00007ec99ab4c35f D0323 21:16:48.255496 249972 task_log.go:94] [ 18313: 18313] R14 = 00007ea5f7236300 D0323 21:16:48.255502 249972 task_log.go:94] [ 18313: 18313] R15 = 0000000000022000 D0323 21:16:48.255508 249972 task_log.go:94] [ 18313: 18313] R8 = 0000000020000180 D0323 21:16:48.255514 249972 task_log.go:94] [ 18313: 18313] R9 = 0000000020000180 D0323 21:16:48.255520 249972 task_log.go:94] [ 18313: 18313] Rax = 0000000000000000 D0323 21:16:48.255526 249972 task_log.go:94] [ 18313: 18313] Rbp = 0000560eede75b39 D0323 21:16:48.255532 249972 task_log.go:94] [ 18313: 18313] Rbx = 0000560eedf39f80 D0323 21:16:48.255545 249972 task_log.go:94] [ 18313: 18313] Rcx = 0000560eede1a0f9 D0323 21:16:48.255553 249972 task_log.go:94] [ 18313: 18313] Rdi = 0000000000000000 D0323 21:16:48.255567 249972 task_log.go:94] [ 18313: 18313] Rdx = 0000000020000100 D0323 21:16:48.255574 249972 task_log.go:94] [ 18313: 18313] Rip = 0000000000001a48 D0323 21:16:48.255590 249972 task_log.go:94] [ 18313: 18313] Rsi = 00000000200000a0 D0323 21:16:48.255596 249972 task_log.go:94] [ 18313: 18313] Rsp = 00000000200000a8 D0323 21:16:48.255602 249972 task_log.go:94] [ 18313: 18313] Ss = 000000000000002b D0323 21:16:48.255608 249972 task_log.go:111] [ 18313: 18313] Stack: D0323 21:16:48.255625 249972 task_log.go:128] [ 18313: 18313] 200000a0: 48 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255633 249972 task_log.go:128] [ 18313: 18313] 200000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255640 249972 task_log.go:128] [ 18313: 18313] 200000c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255647 249972 task_log.go:128] [ 18313: 18313] 200000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255654 249972 task_log.go:128] [ 18313: 18313] 200000e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255660 249972 task_log.go:128] [ 18313: 18313] 200000f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255667 249972 task_log.go:128] [ 18313: 18313] 20000100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255674 249972 task_log.go:128] [ 18313: 18313] 20000110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255680 249972 task_log.go:128] [ 18313: 18313] 20000120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255687 249972 task_log.go:128] [ 18313: 18313] 20000130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255694 249972 task_log.go:128] [ 18313: 18313] 20000140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255700 249972 task_log.go:128] [ 18313: 18313] 20000150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255707 249972 task_log.go:128] [ 18313: 18313] 20000160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255728 249972 task_log.go:128] [ 18313: 18313] 20000170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255747 249972 task_log.go:128] [ 18313: 18313] 20000180: d6 11 20 ab ab 57 ca 56 75 ac c4 47 13 83 b8 f6 D0323 21:16:48.255755 249972 task_log.go:128] [ 18313: 18313] 20000190: 53 10 e3 2a af 17 d1 9e c0 62 36 c4 ae cd 31 9a D0323 21:16:48.255764 249972 task_log.go:128] [ 18313: 18313] 200001a0: 94 68 09 4c 82 93 aa 34 df a8 8f 7c ac ee df 4c D0323 21:16:48.255770 249972 task_log.go:128] [ 18313: 18313] 200001b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255777 249972 task_log.go:128] [ 18313: 18313] 200001c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255784 249972 task_log.go:128] [ 18313: 18313] 200001d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255790 249972 task_log.go:128] [ 18313: 18313] 200001e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255806 249972 task_log.go:128] [ 18313: 18313] 200001f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255813 249972 task_log.go:128] [ 18313: 18313] 20000200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255820 249972 task_log.go:128] [ 18313: 18313] 20000210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255854 249972 task_log.go:128] [ 18313: 18313] 20000220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255889 249972 task_log.go:128] [ 18313: 18313] 20000230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255896 249972 task_log.go:128] [ 18313: 18313] 20000240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255902 249972 task_log.go:128] [ 18313: 18313] 20000250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255910 249972 task_log.go:128] [ 18313: 18313] 20000260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255917 249972 task_log.go:128] [ 18313: 18313] 20000270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255924 249972 task_log.go:128] [ 18313: 18313] 20000280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255931 249972 task_log.go:128] [ 18313: 18313] 20000290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255938 249972 task_log.go:128] [ 18313: 18313] 200002a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255944 249972 task_log.go:128] [ 18313: 18313] 200002b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255951 249972 task_log.go:128] [ 18313: 18313] 200002c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255957 249972 task_log.go:128] [ 18313: 18313] 200002d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255963 249972 task_log.go:128] [ 18313: 18313] 200002e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255979 249972 task_log.go:128] [ 18313: 18313] 200002f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255986 249972 task_log.go:128] [ 18313: 18313] 20000300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255992 249972 task_log.go:128] [ 18313: 18313] 20000310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.255999 249972 task_log.go:128] [ 18313: 18313] 20000320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256012 249972 task_log.go:128] [ 18313: 18313] 20000330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256019 249972 task_log.go:128] [ 18313: 18313] 20000340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256026 249972 task_log.go:128] [ 18313: 18313] 20000350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256032 249972 task_log.go:128] [ 18313: 18313] 20000360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256048 249972 task_log.go:128] [ 18313: 18313] 20000370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256055 249972 task_log.go:128] [ 18313: 18313] 20000380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256062 249972 task_log.go:128] [ 18313: 18313] 20000390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256068 249972 task_log.go:128] [ 18313: 18313] 200003a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256081 249972 task_log.go:128] [ 18313: 18313] 200003b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256087 249972 task_log.go:128] [ 18313: 18313] 200003c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256094 249972 task_log.go:128] [ 18313: 18313] 200003d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256112 249972 task_log.go:128] [ 18313: 18313] 200003e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256119 249972 task_log.go:128] [ 18313: 18313] 200003f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256126 249972 task_log.go:128] [ 18313: 18313] 20000400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256169 249972 task_log.go:128] [ 18313: 18313] 20000410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256177 249972 task_log.go:128] [ 18313: 18313] 20000420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256184 249972 task_log.go:128] [ 18313: 18313] 20000430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256191 249972 task_log.go:128] [ 18313: 18313] 20000440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256198 249972 task_log.go:128] [ 18313: 18313] 20000450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256204 249972 task_log.go:128] [ 18313: 18313] 20000460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256211 249972 task_log.go:128] [ 18313: 18313] 20000470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256217 249972 task_log.go:128] [ 18313: 18313] 20000480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256267 249972 task_log.go:128] [ 18313: 18313] 20000490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:48.256309 249972 task_log.go:149] [ 18313: 18313] Code: D0323 21:16:48.256322 249972 task_log.go:170] [ 18313: 18313] Error reading stack at address 1a00: bad address D0323 21:16:48.256330 249972 task_log.go:71] [ 18313: 18313] Mappings: VMAs: 00060000-00065000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d920000-1b2dd20000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560eedd8e000-560eeddb2000 r--p 00000000 00:08 8 /syz-executor 560eeddb2000-560eede64000 r-xp 00024000 00:08 8 /syz-executor 560eede64000-560eedeb6000 r--p 000d6000 00:08 8 /syz-executor 560eedeb7000-560eedf10000 r--p 00128000 00:08 8 /syz-executor 560eedf10000-560eedf19000 rw-p 00181000 00:08 8 /syz-executor 560eedf1e000-560eeea6a000 rw-p 00000000 00:00 0 560eeea6a000-560eeea8c000 rw-p 00000000 00:00 0 [heap] 7ea5f6600000-7ea5f6800000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6800000-7ea5f6a00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6a00000-7ea5f6c00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6c00000-7ea5f6e00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6e00000-7ea5f7200000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7ea5f7216000-7ea5f7217000 ---p 00000000 00:00 0 7ea5f7217000-7ea5f7237000 rw-p 00000000 00:00 0 7ea5f7237000-7ea5f7238000 r--p 00000000 00:00 0 [vvar] 7ea5f7238000-7ea5f723a000 r-xp 00000000 00:00 0 7ec99a34d000-7ec99ab4d000 rw-p 00000000 00:00 0 [stack] PMAs: 00060000-00061000 r-xp 01d95000 *pgalloc.MemoryFile 00061000-00065000 r-xp 00bfb000 *pgalloc.MemoryFile 20000000-20200000 r-xp 07200000 *pgalloc.MemoryFile 560eedd8e000-560eeddb2000 r--p 06dd5000 *pgalloc.MemoryFile 560eeddcb000-560eeddcc000 r-xp 01d98000 *pgalloc.MemoryFile 560eeddcc000-560eeddcd000 r-xp 01d96000 *pgalloc.MemoryFile 560eeddcd000-560eeddce000 r-xp 013f9000 *pgalloc.MemoryFile 560eede17000-560eede18000 r-xp 01d9f000 *pgalloc.MemoryFile 560eede18000-560eede19000 r-xp 01d97000 *pgalloc.MemoryFile 560eede19000-560eede1a000 r-xp 033ff000 *pgalloc.MemoryFile 560eede1a000-560eede1b000 r-xp 013fa000 *pgalloc.MemoryFile 560eede1b000-560eede1c000 r-xp 03be2000 *pgalloc.MemoryFile 560eede3e000-560eede3f000 r-xp 033fe000 *pgalloc.MemoryFile 560eede3f000-560eede40000 r-xp 01d9d000 *pgalloc.MemoryFile 560eede57000-560eede58000 r-xp 01d99000 *pgalloc.MemoryFile 560eede63000-560eede64000 r-xp 00bf9000 *pgalloc.MemoryFile 560eede64000-560eedeb6000 r--p 09955000 *pgalloc.MemoryFile 560eedeb7000-560eedf19000 r--p 06ffc000 *pgalloc.MemoryFile 560eedf1e000-560eee000000 r--p 0705e000 *pgalloc.MemoryFile 560eeea00000-560eeea6a000 r--p 06f19000 *pgalloc.MemoryFile 560eeea6a000-560eeea6b000 r--p 013f7000 *pgalloc.MemoryFile 560eeea6b000-560eeea8c000 r--p 07140000 *pgalloc.MemoryFile 7ea5f7217000-7ea5f7237000 r--p 06f83000 *pgalloc.MemoryFile 7ec99aa00000-7ec99ab49000 r--p 0fa00000 *pgalloc.MemoryFile 7ec99ab49000-7ec99ab4b000 r--p 06ecd000 *pgalloc.MemoryFile 7ec99ab4b000-7ec99ab4d000 r--p 01d9b000 *pgalloc.MemoryFile D0323 21:16:48.256482 249972 task_log.go:73] [ 18313: 18313] FDTable: fd:1 => name pipe:[5] fd:2 => name pipe:[5] fd:200 => name /dev/net/tun fd:201 => name / fd:220 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:218 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:215 => name /sys/kernel/debug/kcov fd:216 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov D0323 21:16:48.256532 249972 task_signals.go:470] [ 18313: 18313] Notified of signal 11 D0323 21:16:48.256547 249972 task_signals.go:220] [ 18313: 18313] Signal 11: delivering to handler D0323 21:16:48.256561 249972 task_signals.go:223] [ 18313: 18313] Failed to deliver signal &{Signo:11 Errno:0 Code:1 _:0 Fields:[72 26 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0]} to user handler: bad address D0323 21:16:48.256613 249972 task_signals.go:481] [ 18313: 18313] No task notified of signal 11 D0323 21:16:48.256625 249972 task_signals.go:204] [ 18313: 18313] Signal 18313, PID: 18313, TID: 0, fault addr: 0xb: terminating thread group D0323 21:16:48.256638 249972 task_exit.go:204] [ 18313: 18313] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.256907 249972 task_exit.go:204] [ 18313: 18313] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.259450 249972 usertrap_amd64.go:212] [ 18311: 18311] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.259477 249972 usertrap_amd64.go:122] [ 18311: 18311] Allocate a new trap: 0xc0090746c0 42 D0323 21:16:48.259492 249972 usertrap_amd64.go:225] [ 18311: 18311] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.259918 249972 task_exit.go:204] [ 18311: 18311] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.259949 249972 task_exit.go:204] [ 18311: 18311] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.260012 249972 task_signals.go:204] [ 18311: 18312] Signal 18311, PID: 18312, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.260041 249972 task_exit.go:204] [ 18311: 18312] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.262098 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.262121 249972 task_exit.go:204] [ 18311: 18312] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.262127 249972 task_exit.go:204] [ 18311: 18312] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.262134 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.263192 249972 task_exit.go:204] [ 18311: 18311] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x40240, 0x0) D0323 21:16:48.264347 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.264493 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.265492 249972 task_exit.go:204] [ 18313: 18313] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.271321 249972 usertrap_amd64.go:212] [ 18314: 18314] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.271344 249972 usertrap_amd64.go:122] [ 18314: 18314] Allocate a new trap: 0xc00bba5c50 39 D0323 21:16:48.271426 249972 usertrap_amd64.go:225] [ 18314: 18314] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.271816 249972 usertrap_amd64.go:212] [ 18314: 18314] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.271835 249972 usertrap_amd64.go:122] [ 18314: 18314] Allocate a new trap: 0xc00bba5c50 40 D0323 21:16:48.271843 249972 usertrap_amd64.go:225] [ 18314: 18314] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.272286 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.272453 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.275813 249972 usertrap_amd64.go:212] [ 18314: 18314] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.275838 249972 usertrap_amd64.go:122] [ 18314: 18314] Allocate a new trap: 0xc00bba5c50 41 D0323 21:16:48.275849 249972 usertrap_amd64.go:225] [ 18314: 18314] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.281531 249972 usertrap_amd64.go:212] [ 18314: 18314] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.281593 249972 usertrap_amd64.go:122] [ 18314: 18314] Allocate a new trap: 0xc00bba5c50 42 D0323 21:16:48.281615 249972 usertrap_amd64.go:225] [ 18314: 18314] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.282143 249972 task_exit.go:204] [ 18314: 18314] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.282190 249972 task_exit.go:204] [ 18314: 18314] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.282297 249972 task_signals.go:204] [ 18314: 18315] Signal 18314, PID: 18315, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.282331 249972 task_exit.go:204] [ 18314: 18315] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.284092 249972 task_exit.go:204] [ 18314: 18315] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.284126 249972 task_exit.go:204] [ 18314: 18315] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.284144 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.284876 249972 task_exit.go:204] [ 18314: 18314] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.285765 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.285907 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x15) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r1, 0x404c4701, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "ebeed70000000000000000960000000800"}) D0323 21:16:48.296319 249972 usertrap_amd64.go:212] [ 18316: 18316] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.296345 249972 usertrap_amd64.go:122] [ 18316: 18316] Allocate a new trap: 0xc008faf980 39 D0323 21:16:48.296450 249972 usertrap_amd64.go:225] [ 18316: 18316] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.297246 249972 usertrap_amd64.go:212] [ 18316: 18316] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.297267 249972 usertrap_amd64.go:122] [ 18316: 18316] Allocate a new trap: 0xc008faf980 40 D0323 21:16:48.297276 249972 usertrap_amd64.go:225] [ 18316: 18316] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.298211 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.298353 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.303450 249972 usertrap_amd64.go:212] [ 18316: 18316] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.303470 249972 usertrap_amd64.go:122] [ 18316: 18316] Allocate a new trap: 0xc008faf980 41 D0323 21:16:48.303482 249972 usertrap_amd64.go:225] [ 18316: 18316] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.310654 249972 usertrap_amd64.go:212] [ 18316: 18317] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:48.310680 249972 usertrap_amd64.go:122] [ 18316: 18317] Allocate a new trap: 0xc008faf980 42 D0323 21:16:48.310694 249972 usertrap_amd64.go:225] [ 18316: 18317] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.311814 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.311989 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.313848 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.313973 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.315710 249972 usertrap_amd64.go:212] [ 18316: 18316] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.315726 249972 usertrap_amd64.go:122] [ 18316: 18316] Allocate a new trap: 0xc008faf980 43 D0323 21:16:48.315737 249972 usertrap_amd64.go:225] [ 18316: 18316] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:48.316192 249972 task_exit.go:204] [ 18316: 18316] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.316220 249972 task_exit.go:204] [ 18316: 18316] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.316289 249972 task_signals.go:204] [ 18316: 18317] Signal 18316, PID: 18317, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.316326 249972 task_exit.go:204] [ 18316: 18317] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.317858 249972 task_exit.go:204] [ 18316: 18317] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.317874 249972 task_exit.go:204] [ 18316: 18317] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.317883 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.319874 249972 task_exit.go:204] [ 18316: 18316] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000006880)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000002b40)="85790d510ee43e264175d85d863ca3e7a82fc94db77e27fc5207c60a24542c8ffcbd8c105314ca8895270ae4c63cb843b3995020c35dae97c13cd11f34523f0f9045d47c1c1be3914c730f82e88d772f246314ea96c531fe4a4bc8a0371932bed97ab67c0bc04b5e127581493ae415b6ed5f457514ebffd77b7d7ba52bf673fbe44c1a893cd807dcfbcdb1349a3388939ff9c66c1816ac4c4fbfc198a4710d08dc73723badea85c426a7842246aa6a50a29ce4c992c670228ba56242056f402e812060dabc2ffb1774a45716466bfd79606a03494f247a72731dd848ea29a7c312f288e794faf57ea83c7721777eebdac40c674abd798fb172fd49153a0d3c65bfd9509ea42ef8ddd0c79a4d7979a0b75e9bbdf1af939f8f88ba59491bae10c153948b9f7afa5e26578673f7c86f68273ef8808e28038f578bc8e294706eb6f42e91a59094f94acac9c429032121d30e72514e6a4617ecc35e74ad4996594f634ac3aa8dbed879d9cf5530a43471fd876c36d431b029b912707f56ff98bd2e749d3643c5e73ede0e07edc09ebd04385e54aeda97a5ece59c7ebd716481b5eeafcf38648c54384b8087770fbe8218b3dfa4b544dc965ec583da492ba5b56df8d61bae08e8e86076e58407d6773992994cf42fed7a7418b35263ef7259218e213ad15fbca418893d1f4673332ea8cef38456519e47f8c911905ab8c77e51801a033c8aa65556ad5f0d7f0402e5d6b303aa0aa959ca45d9587297c3ca6c11c64e45baef35a29ac2f9185553986f0384a2034c5e8388e6400d0ad104e2d6778c15b07abdc99cf2fdc474a76066416e5194f108e27ac01f76829b7a11ea1ed06ca6588780a35c4e853d2d3937d133863a40f7921310620ce6d4cce0965f54f86000f945f94628467bb14e397b641d3b5101e10dee57072295d59f4ad80cf4f0fd13c9a4282bf6b2887e32108e4059f1f9e41313e323fa52863796cc4f1746d7b5d78d595a324f9ce1bcd8f85b936689cb24e53561231cd3e737f163ffac026ead8e7e980eb82a537cf4af1f15240c8ca922c03497cbd5bbc5d68cdf080bd89fb5d7d0f7c98c4c327d8e3737dfdb0e29bcd0bd9f2153391bc6cfeab3e147085517e184cb6b8415f941f0cc17eeda11d80e40aeafbe3984c615346d362d9b8398ab48b5f6d5461883dcbeb646482659556366d9bce108871582af3772f175a04eaab753ca59811eef18545363155f6398702304f4447252f0ed14c6e79381ede297fb948b1db38a5c6b0c2c53538d28c361883ef2c5876f2cd5016d609f6373db2e16c40b861af292720e9f4cdda6bdd7d7b3405c2fd7bd71e1d2cc5f06ebfcf44cb7d43d44c32e8be27955f32d584f5a2c24b83fc11c79260a5bb2f53ede239e6a06a60be22d72a55d173918736c9179a6c27b59f1f89824200e07455d04eec68ef053957c853ba623aaf70068816384917b2192ec6ba80a3c9991ac53f28958809aee63d6b3b8e6f92dad9354bb8a47fb9ffa49110d6c63510e04347ae06a5c44528c309f07941d3fe1946d196f0ec777d96f66a36363375e3474902e3b74d74c545155c1fd2323c6f8478beb162d827029e6b5def429e70c15e906691a80028472849a48f20fa69acb6975dd30352a05b4d81102fcbb627a6df0497a9e7e5d7d2620e24e12ed739e628309dbb14d92ab9bbc1d930600"/1217, 0x4c1}], 0x1}}], 0x1, 0x60cd814) D0323 21:16:48.321715 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.321844 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.330937 249972 usertrap_amd64.go:212] [ 18318: 18318] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.330964 249972 usertrap_amd64.go:122] [ 18318: 18318] Allocate a new trap: 0xc004638a50 39 D0323 21:16:48.331039 249972 usertrap_amd64.go:225] [ 18318: 18318] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.331599 249972 usertrap_amd64.go:212] [ 18318: 18318] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.331622 249972 usertrap_amd64.go:122] [ 18318: 18318] Allocate a new trap: 0xc004638a50 40 D0323 21:16:48.331631 249972 usertrap_amd64.go:225] [ 18318: 18318] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.332043 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.332230 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.334750 249972 usertrap_amd64.go:212] [ 18318: 18318] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.334774 249972 usertrap_amd64.go:122] [ 18318: 18318] Allocate a new trap: 0xc004638a50 41 D0323 21:16:48.334783 249972 usertrap_amd64.go:225] [ 18318: 18318] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.355118 249972 usertrap_amd64.go:212] [ 18318: 18318] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.355225 249972 usertrap_amd64.go:122] [ 18318: 18318] Allocate a new trap: 0xc004638a50 42 D0323 21:16:48.355244 249972 usertrap_amd64.go:225] [ 18318: 18318] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.356982 249972 task_exit.go:204] [ 18318: 18318] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.357019 249972 task_exit.go:204] [ 18318: 18318] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.357448 249972 task_signals.go:204] [ 18318: 18319] Signal 18318, PID: 18319, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.357470 249972 task_exit.go:204] [ 18318: 18319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.358892 249972 task_exit.go:204] [ 18318: 18319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.358919 249972 task_exit.go:204] [ 18318: 18319] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.358942 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.359860 249972 task_exit.go:204] [ 18318: 18318] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "78695536554cc1ca2aef205f28d17a428ee73c"}) D0323 21:16:48.362943 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.363118 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.377841 249972 usertrap_amd64.go:212] [ 18320: 18320] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.377883 249972 usertrap_amd64.go:122] [ 18320: 18320] Allocate a new trap: 0xc007faaba0 39 D0323 21:16:48.378018 249972 usertrap_amd64.go:225] [ 18320: 18320] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.379604 249972 usertrap_amd64.go:212] [ 18320: 18320] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.379644 249972 usertrap_amd64.go:122] [ 18320: 18320] Allocate a new trap: 0xc007faaba0 40 D0323 21:16:48.379661 249972 usertrap_amd64.go:225] [ 18320: 18320] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.380752 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.380965 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.383595 249972 usertrap_amd64.go:212] [ 18320: 18320] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.383623 249972 usertrap_amd64.go:122] [ 18320: 18320] Allocate a new trap: 0xc007faaba0 41 D0323 21:16:48.383635 249972 usertrap_amd64.go:225] [ 18320: 18320] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.394423 249972 usertrap_amd64.go:212] [ 18320: 18321] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:48.394462 249972 usertrap_amd64.go:122] [ 18320: 18321] Allocate a new trap: 0xc007faaba0 42 D0323 21:16:48.394479 249972 usertrap_amd64.go:225] [ 18320: 18321] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.395072 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.395284 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.397490 249972 usertrap_amd64.go:212] [ 18320: 18320] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.397528 249972 usertrap_amd64.go:122] [ 18320: 18320] Allocate a new trap: 0xc007faaba0 43 D0323 21:16:48.397545 249972 usertrap_amd64.go:225] [ 18320: 18320] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:48.397847 249972 task_exit.go:204] [ 18320: 18320] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.397882 249972 task_exit.go:204] [ 18320: 18320] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.397946 249972 task_signals.go:204] [ 18320: 18321] Signal 18320, PID: 18321, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.397969 249972 task_exit.go:204] [ 18320: 18321] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.399634 249972 task_exit.go:204] [ 18320: 18321] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.399662 249972 task_exit.go:204] [ 18320: 18321] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.399674 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.400238 249972 task_exit.go:204] [ 18320: 18320] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.402749 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.402890 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:48 executing program 0: r0 = open$dir(&(0x7f0000001a00)='./file0\x00', 0x40, 0x0) utimensat(r0, 0x0, 0x0, 0x0) D0323 21:16:48.418242 249972 usertrap_amd64.go:212] [ 18322: 18322] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.418363 249972 usertrap_amd64.go:122] [ 18322: 18322] Allocate a new trap: 0xc004638b10 39 D0323 21:16:48.418465 249972 usertrap_amd64.go:225] [ 18322: 18322] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.420545 249972 usertrap_amd64.go:212] [ 18322: 18322] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.420575 249972 usertrap_amd64.go:122] [ 18322: 18322] Allocate a new trap: 0xc004638b10 40 D0323 21:16:48.420588 249972 usertrap_amd64.go:225] [ 18322: 18322] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.421941 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.422179 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.427221 249972 usertrap_amd64.go:212] [ 18322: 18322] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.427249 249972 usertrap_amd64.go:122] [ 18322: 18322] Allocate a new trap: 0xc004638b10 41 D0323 21:16:48.427261 249972 usertrap_amd64.go:225] [ 18322: 18322] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.439656 249972 usertrap_amd64.go:212] [ 18322: 18322] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.439690 249972 usertrap_amd64.go:122] [ 18322: 18322] Allocate a new trap: 0xc004638b10 42 D0323 21:16:48.439701 249972 usertrap_amd64.go:225] [ 18322: 18322] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.440049 249972 task_exit.go:204] [ 18322: 18322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.440072 249972 task_exit.go:204] [ 18322: 18322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.440151 249972 task_signals.go:204] [ 18322: 18323] Signal 18322, PID: 18323, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.440180 249972 task_exit.go:204] [ 18322: 18323] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.443704 249972 task_exit.go:204] [ 18322: 18323] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.443730 249972 task_exit.go:204] [ 18322: 18323] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.443754 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.446378 249972 task_exit.go:204] [ 18322: 18322] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.450398 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.450617 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:48 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000002580)) D0323 21:16:48.470944 249972 usertrap_amd64.go:212] [ 18324: 18324] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.470985 249972 usertrap_amd64.go:122] [ 18324: 18324] Allocate a new trap: 0xc004638c00 39 D0323 21:16:48.471055 249972 usertrap_amd64.go:225] [ 18324: 18324] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.472136 249972 usertrap_amd64.go:212] [ 18324: 18324] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.472182 249972 usertrap_amd64.go:122] [ 18324: 18324] Allocate a new trap: 0xc004638c00 40 D0323 21:16:48.472200 249972 usertrap_amd64.go:225] [ 18324: 18324] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.473187 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.473409 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.477489 249972 usertrap_amd64.go:212] [ 18324: 18324] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.477521 249972 usertrap_amd64.go:122] [ 18324: 18324] Allocate a new trap: 0xc004638c00 41 D0323 21:16:48.477533 249972 usertrap_amd64.go:225] [ 18324: 18324] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.485584 249972 usertrap_amd64.go:212] [ 18324: 18324] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.485627 249972 usertrap_amd64.go:122] [ 18324: 18324] Allocate a new trap: 0xc004638c00 42 D0323 21:16:48.485644 249972 usertrap_amd64.go:225] [ 18324: 18324] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.486077 249972 task_exit.go:204] [ 18324: 18324] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.486113 249972 task_exit.go:204] [ 18324: 18324] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.486269 249972 task_signals.go:204] [ 18324: 18325] Signal 18324, PID: 18325, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.486291 249972 task_exit.go:204] [ 18324: 18325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.487893 249972 task_exit.go:204] [ 18324: 18325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.487934 249972 task_exit.go:204] [ 18324: 18325] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.487954 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.489342 249972 task_exit.go:204] [ 18324: 18324] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$cgroup_pressure(r0, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) D0323 21:16:48.491564 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.491748 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.503395 249972 usertrap_amd64.go:212] [ 18326: 18326] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.503443 249972 usertrap_amd64.go:122] [ 18326: 18326] Allocate a new trap: 0xc004638c60 39 D0323 21:16:48.503573 249972 usertrap_amd64.go:225] [ 18326: 18326] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.504359 249972 usertrap_amd64.go:212] [ 18326: 18326] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.504392 249972 usertrap_amd64.go:122] [ 18326: 18326] Allocate a new trap: 0xc004638c60 40 D0323 21:16:48.504405 249972 usertrap_amd64.go:225] [ 18326: 18326] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.505184 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.505420 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.509324 249972 usertrap_amd64.go:212] [ 18326: 18326] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.509354 249972 usertrap_amd64.go:122] [ 18326: 18326] Allocate a new trap: 0xc004638c60 41 D0323 21:16:48.509365 249972 usertrap_amd64.go:225] [ 18326: 18326] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.518451 249972 usertrap_amd64.go:212] [ 18326: 18326] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.518475 249972 usertrap_amd64.go:122] [ 18326: 18326] Allocate a new trap: 0xc004638c60 42 D0323 21:16:48.518488 249972 usertrap_amd64.go:225] [ 18326: 18326] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.518750 249972 task_exit.go:204] [ 18326: 18326] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.518785 249972 task_exit.go:204] [ 18326: 18326] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.518828 249972 task_signals.go:204] [ 18326: 18327] Signal 18326, PID: 18327, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.518850 249972 task_exit.go:204] [ 18326: 18327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.522812 249972 task_exit.go:204] [ 18326: 18327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.522840 249972 task_exit.go:204] [ 18326: 18327] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.522851 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.525449 249972 task_exit.go:204] [ 18326: 18326] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: msgget$private(0x0, 0x11) D0323 21:16:48.527008 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.527335 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.538669 249972 usertrap_amd64.go:212] [ 18328: 18328] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.538755 249972 usertrap_amd64.go:122] [ 18328: 18328] Allocate a new trap: 0xc000946870 39 D0323 21:16:48.538819 249972 usertrap_amd64.go:225] [ 18328: 18328] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.544762 249972 usertrap_amd64.go:212] [ 18328: 18328] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.544793 249972 usertrap_amd64.go:122] [ 18328: 18328] Allocate a new trap: 0xc000946870 40 D0323 21:16:48.544809 249972 usertrap_amd64.go:225] [ 18328: 18328] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.546060 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.546291 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.551282 249972 usertrap_amd64.go:212] [ 18328: 18328] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.551313 249972 usertrap_amd64.go:122] [ 18328: 18328] Allocate a new trap: 0xc000946870 41 D0323 21:16:48.551332 249972 usertrap_amd64.go:225] [ 18328: 18328] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.557485 249972 usertrap_amd64.go:212] [ 18328: 18328] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.557511 249972 usertrap_amd64.go:122] [ 18328: 18328] Allocate a new trap: 0xc000946870 42 D0323 21:16:48.557525 249972 usertrap_amd64.go:225] [ 18328: 18328] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.558175 249972 task_exit.go:204] [ 18328: 18328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.558219 249972 task_exit.go:204] [ 18328: 18328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.558274 249972 task_signals.go:204] [ 18328: 18329] Signal 18328, PID: 18329, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.558311 249972 task_exit.go:204] [ 18328: 18329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.561451 249972 task_exit.go:204] [ 18328: 18329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.561545 249972 task_exit.go:204] [ 18328: 18329] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.561575 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.562750 249972 task_exit.go:204] [ 18328: 18328] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f00000000c0)="fb", 0xfffff, 0xfffffffffffffffc) D0323 21:16:48.564585 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.564728 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.573990 249972 usertrap_amd64.go:212] [ 18330: 18330] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.574041 249972 usertrap_amd64.go:122] [ 18330: 18330] Allocate a new trap: 0xc007b08060 39 D0323 21:16:48.574187 249972 usertrap_amd64.go:225] [ 18330: 18330] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.577071 249972 usertrap_amd64.go:212] [ 18330: 18330] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.577110 249972 usertrap_amd64.go:122] [ 18330: 18330] Allocate a new trap: 0xc007b08060 40 D0323 21:16:48.577126 249972 usertrap_amd64.go:225] [ 18330: 18330] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.577955 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.580170 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.586384 249972 usertrap_amd64.go:212] [ 18330: 18330] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.586417 249972 usertrap_amd64.go:122] [ 18330: 18330] Allocate a new trap: 0xc007b08060 41 D0323 21:16:48.586432 249972 usertrap_amd64.go:225] [ 18330: 18330] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.594634 249972 usertrap_amd64.go:212] [ 18330: 18330] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.594669 249972 usertrap_amd64.go:122] [ 18330: 18330] Allocate a new trap: 0xc007b08060 42 D0323 21:16:48.594685 249972 usertrap_amd64.go:225] [ 18330: 18330] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.595773 249972 task_exit.go:204] [ 18330: 18330] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.595811 249972 task_exit.go:204] [ 18330: 18330] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.595915 249972 task_signals.go:204] [ 18330: 18331] Signal 18330, PID: 18331, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.595949 249972 task_exit.go:204] [ 18330: 18331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.597398 249972 task_exit.go:204] [ 18330: 18331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.597450 249972 task_exit.go:204] [ 18330: 18331] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.597469 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.601520 249972 task_exit.go:204] [ 18330: 18330] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket(0x2, 0x3, 0x1) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)='M', 0x1}, {&(0x7f0000000340)='m', 0x1}], 0x2}, 0x0) D0323 21:16:48.602844 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.602998 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.611565 249972 usertrap_amd64.go:212] [ 18332: 18332] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.611599 249972 usertrap_amd64.go:122] [ 18332: 18332] Allocate a new trap: 0xc009074f00 39 D0323 21:16:48.611691 249972 usertrap_amd64.go:225] [ 18332: 18332] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.612388 249972 usertrap_amd64.go:212] [ 18332: 18332] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.612398 249972 usertrap_amd64.go:122] [ 18332: 18332] Allocate a new trap: 0xc009074f00 40 D0323 21:16:48.612405 249972 usertrap_amd64.go:225] [ 18332: 18332] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.612829 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.613030 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.617230 249972 usertrap_amd64.go:212] [ 18332: 18332] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.617258 249972 usertrap_amd64.go:122] [ 18332: 18332] Allocate a new trap: 0xc009074f00 41 D0323 21:16:48.617270 249972 usertrap_amd64.go:225] [ 18332: 18332] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.625623 249972 usertrap_amd64.go:212] [ 18332: 18332] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.625699 249972 usertrap_amd64.go:122] [ 18332: 18332] Allocate a new trap: 0xc009074f00 42 D0323 21:16:48.625723 249972 usertrap_amd64.go:225] [ 18332: 18332] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.626726 249972 task_exit.go:204] [ 18332: 18332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.626767 249972 task_exit.go:204] [ 18332: 18332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.626790 249972 task_signals.go:204] [ 18332: 18333] Signal 18332, PID: 18333, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.626826 249972 task_exit.go:204] [ 18332: 18333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.630237 249972 task_exit.go:204] [ 18332: 18333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.630302 249972 task_exit.go:204] [ 18332: 18333] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.630320 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.633160 249972 task_exit.go:204] [ 18332: 18332] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000340)={@random="4db45b6ee3db", @local, @val, {@ipv6}}, 0x0) D0323 21:16:48.635250 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.635547 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.643191 249972 usertrap_amd64.go:212] [ 18334: 18334] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.643219 249972 usertrap_amd64.go:122] [ 18334: 18334] Allocate a new trap: 0xc008a23d10 39 D0323 21:16:48.643293 249972 usertrap_amd64.go:225] [ 18334: 18334] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.644471 249972 usertrap_amd64.go:212] [ 18334: 18334] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.644509 249972 usertrap_amd64.go:122] [ 18334: 18334] Allocate a new trap: 0xc008a23d10 40 D0323 21:16:48.644518 249972 usertrap_amd64.go:225] [ 18334: 18334] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.644806 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.645969 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.648229 249972 usertrap_amd64.go:212] [ 18334: 18334] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.648245 249972 usertrap_amd64.go:122] [ 18334: 18334] Allocate a new trap: 0xc008a23d10 41 D0323 21:16:48.648271 249972 usertrap_amd64.go:225] [ 18334: 18334] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.655965 249972 usertrap_amd64.go:212] [ 18334: 18335] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:48.656021 249972 usertrap_amd64.go:122] [ 18334: 18335] Allocate a new trap: 0xc008a23d10 42 D0323 21:16:48.656041 249972 usertrap_amd64.go:225] [ 18334: 18335] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.657947 249972 usertrap_amd64.go:212] [ 18334: 18334] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.657981 249972 usertrap_amd64.go:122] [ 18334: 18334] Allocate a new trap: 0xc008a23d10 43 D0323 21:16:48.657995 249972 usertrap_amd64.go:225] [ 18334: 18334] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:48.658129 249972 task_exit.go:204] [ 18334: 18334] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.658164 249972 task_exit.go:204] [ 18334: 18334] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.658243 249972 task_signals.go:204] [ 18334: 18335] Signal 18334, PID: 18335, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.658267 249972 task_exit.go:204] [ 18334: 18335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.659856 249972 task_exit.go:204] [ 18334: 18335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.659966 249972 task_exit.go:204] [ 18334: 18335] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.660017 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.660594 249972 task_exit.go:204] [ 18334: 18334] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r2 = dup2(r0, r0) sendto$packet(r2, &(0x7f0000000080)="01f488a8", 0x4, 0x0, &(0x7f0000003100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="de3f8dbd548a"}, 0x14) D0323 21:16:48.662332 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.662536 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.674383 249972 usertrap_amd64.go:212] [ 18336: 18336] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.674410 249972 usertrap_amd64.go:122] [ 18336: 18336] Allocate a new trap: 0xc008a23d70 39 D0323 21:16:48.674506 249972 usertrap_amd64.go:225] [ 18336: 18336] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.675258 249972 usertrap_amd64.go:212] [ 18336: 18336] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.675274 249972 usertrap_amd64.go:122] [ 18336: 18336] Allocate a new trap: 0xc008a23d70 40 D0323 21:16:48.675286 249972 usertrap_amd64.go:225] [ 18336: 18336] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.675844 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.676064 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.678777 249972 usertrap_amd64.go:212] [ 18336: 18336] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.678801 249972 usertrap_amd64.go:122] [ 18336: 18336] Allocate a new trap: 0xc008a23d70 41 D0323 21:16:48.678812 249972 usertrap_amd64.go:225] [ 18336: 18336] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.696199 249972 usertrap_amd64.go:212] [ 18336: 18336] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.696238 249972 usertrap_amd64.go:122] [ 18336: 18336] Allocate a new trap: 0xc008a23d70 42 D0323 21:16:48.696253 249972 usertrap_amd64.go:225] [ 18336: 18336] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.697197 249972 task_exit.go:204] [ 18336: 18336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.697241 249972 task_exit.go:204] [ 18336: 18336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.697336 249972 task_signals.go:204] [ 18336: 18337] Signal 18336, PID: 18337, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.697396 249972 task_exit.go:204] [ 18336: 18337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.698973 249972 task_exit.go:204] [ 18336: 18337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.699004 249972 task_exit.go:204] [ 18336: 18337] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.699021 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.700017 249972 task_exit.go:204] [ 18336: 18336] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000940)='ns/user\x00') D0323 21:16:48.702286 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.702468 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.711951 249972 usertrap_amd64.go:212] [ 18338: 18338] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.711981 249972 usertrap_amd64.go:122] [ 18338: 18338] Allocate a new trap: 0xc007fab230 39 D0323 21:16:48.712130 249972 usertrap_amd64.go:225] [ 18338: 18338] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.712871 249972 usertrap_amd64.go:212] [ 18338: 18338] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.712978 249972 usertrap_amd64.go:122] [ 18338: 18338] Allocate a new trap: 0xc007fab230 40 D0323 21:16:48.713062 249972 usertrap_amd64.go:225] [ 18338: 18338] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.713905 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.714108 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.716956 249972 usertrap_amd64.go:212] [ 18338: 18338] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.717025 249972 usertrap_amd64.go:122] [ 18338: 18338] Allocate a new trap: 0xc007fab230 41 D0323 21:16:48.717044 249972 usertrap_amd64.go:225] [ 18338: 18338] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.731693 249972 usertrap_amd64.go:212] [ 18340: 18340] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:48.731724 249972 usertrap_amd64.go:122] [ 18340: 18340] Allocate a new trap: 0xc007fab260 42 D0323 21:16:48.731796 249972 usertrap_amd64.go:225] [ 18340: 18340] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.733367 249972 usertrap_amd64.go:212] [ 18338: 18339] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:48.733409 249972 usertrap_amd64.go:122] [ 18338: 18339] Allocate a new trap: 0xc007fab230 42 D0323 21:16:48.733431 249972 usertrap_amd64.go:225] [ 18338: 18339] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.733957 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.734137 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.735316 249972 usertrap_amd64.go:212] [ 18338: 18338] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.735381 249972 usertrap_amd64.go:122] [ 18338: 18338] Allocate a new trap: 0xc007fab230 43 D0323 21:16:48.735400 249972 usertrap_amd64.go:225] [ 18338: 18338] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:48.735758 249972 task_exit.go:204] [ 18338: 18338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.735849 249972 task_exit.go:204] [ 18338: 18338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.735921 249972 task_signals.go:204] [ 18338: 18339] Signal 18338, PID: 18339, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.735940 249972 task_exit.go:204] [ 18338: 18339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.737379 249972 task_exit.go:204] [ 18338: 18339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.737409 249972 task_exit.go:204] [ 18338: 18339] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.737426 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.738040 249972 task_exit.go:204] [ 18338: 18338] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) D0323 21:16:48.741853 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.743288 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.750871 249972 usertrap_amd64.go:212] [ 18341: 18341] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.750907 249972 usertrap_amd64.go:122] [ 18341: 18341] Allocate a new trap: 0xc009075260 39 D0323 21:16:48.751000 249972 usertrap_amd64.go:225] [ 18341: 18341] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.751504 249972 usertrap_amd64.go:212] [ 18341: 18341] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.751522 249972 usertrap_amd64.go:122] [ 18341: 18341] Allocate a new trap: 0xc009075260 40 D0323 21:16:48.751534 249972 usertrap_amd64.go:225] [ 18341: 18341] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.751928 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.752097 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.754819 249972 usertrap_amd64.go:212] [ 18341: 18341] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.754848 249972 usertrap_amd64.go:122] [ 18341: 18341] Allocate a new trap: 0xc009075260 41 D0323 21:16:48.754859 249972 usertrap_amd64.go:225] [ 18341: 18341] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.759924 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.760404 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.761959 249972 usertrap_amd64.go:212] [ 18341: 18341] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.761998 249972 usertrap_amd64.go:122] [ 18341: 18341] Allocate a new trap: 0xc009075260 42 D0323 21:16:48.762012 249972 usertrap_amd64.go:225] [ 18341: 18341] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.762364 249972 task_exit.go:204] [ 18341: 18341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.762401 249972 task_exit.go:204] [ 18341: 18341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.762401 249972 task_signals.go:204] [ 18341: 18342] Signal 18341, PID: 18342, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.762427 249972 task_exit.go:204] [ 18341: 18342] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.763840 249972 task_exit.go:204] [ 18341: 18342] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.763866 249972 task_exit.go:204] [ 18341: 18342] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.763879 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.765352 249972 task_exit.go:204] [ 18341: 18341] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}, 0x1, 0x0, &(0x7f0000000240)) D0323 21:16:48.766559 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.766657 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.775791 249972 usertrap_amd64.go:212] [ 18343: 18343] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.775818 249972 usertrap_amd64.go:122] [ 18343: 18343] Allocate a new trap: 0xc008fafa70 39 D0323 21:16:48.775896 249972 usertrap_amd64.go:225] [ 18343: 18343] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.776358 249972 usertrap_amd64.go:212] [ 18343: 18343] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.776382 249972 usertrap_amd64.go:122] [ 18343: 18343] Allocate a new trap: 0xc008fafa70 40 D0323 21:16:48.776394 249972 usertrap_amd64.go:225] [ 18343: 18343] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.776739 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.777036 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.779599 249972 usertrap_amd64.go:212] [ 18343: 18343] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.779626 249972 usertrap_amd64.go:122] [ 18343: 18343] Allocate a new trap: 0xc008fafa70 41 D0323 21:16:48.779636 249972 usertrap_amd64.go:225] [ 18343: 18343] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.784728 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.784933 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.786445 249972 usertrap_amd64.go:212] [ 18343: 18343] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.786469 249972 usertrap_amd64.go:122] [ 18343: 18343] Allocate a new trap: 0xc008fafa70 42 D0323 21:16:48.786480 249972 usertrap_amd64.go:225] [ 18343: 18343] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.786819 249972 task_exit.go:204] [ 18343: 18343] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.786852 249972 task_exit.go:204] [ 18343: 18343] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.787704 249972 task_signals.go:204] [ 18343: 18344] Signal 18343, PID: 18344, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.787729 249972 task_exit.go:204] [ 18343: 18344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.789446 249972 task_exit.go:204] [ 18343: 18344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.789475 249972 task_exit.go:204] [ 18343: 18344] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.789488 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.790187 249972 task_exit.go:204] [ 18343: 18343] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.790871 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:48 executing program 0: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x74, &(0x7f0000000180)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) D0323 21:16:48.791070 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.798525 249972 usertrap_amd64.go:212] [ 18345: 18345] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.798557 249972 usertrap_amd64.go:122] [ 18345: 18345] Allocate a new trap: 0xc009075440 39 D0323 21:16:48.798641 249972 usertrap_amd64.go:225] [ 18345: 18345] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.799127 249972 usertrap_amd64.go:212] [ 18345: 18345] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.799148 249972 usertrap_amd64.go:122] [ 18345: 18345] Allocate a new trap: 0xc009075440 40 D0323 21:16:48.799158 249972 usertrap_amd64.go:225] [ 18345: 18345] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.799510 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.799675 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.802126 249972 usertrap_amd64.go:212] [ 18345: 18345] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.802148 249972 usertrap_amd64.go:122] [ 18345: 18345] Allocate a new trap: 0xc009075440 41 D0323 21:16:48.802156 249972 usertrap_amd64.go:225] [ 18345: 18345] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.808315 249972 usertrap_amd64.go:212] [ 18345: 18345] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.808340 249972 usertrap_amd64.go:122] [ 18345: 18345] Allocate a new trap: 0xc009075440 42 D0323 21:16:48.808350 249972 usertrap_amd64.go:225] [ 18345: 18345] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.808658 249972 task_exit.go:204] [ 18345: 18345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.808689 249972 task_exit.go:204] [ 18345: 18345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.808691 249972 task_signals.go:204] [ 18345: 18346] Signal 18345, PID: 18346, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.808708 249972 task_exit.go:204] [ 18345: 18346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.811676 249972 task_exit.go:204] [ 18345: 18346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.811700 249972 task_exit.go:204] [ 18345: 18346] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.811709 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.813789 249972 task_exit.go:204] [ 18345: 18345] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket(0x2, 0x3, 0x1) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)="4da70c", 0x3}], 0x1}, 0x0) D0323 21:16:48.814907 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.815046 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.824679 249972 usertrap_amd64.go:212] [ 18347: 18347] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.824715 249972 usertrap_amd64.go:122] [ 18347: 18347] Allocate a new trap: 0xc008fafe90 39 D0323 21:16:48.824803 249972 usertrap_amd64.go:225] [ 18347: 18347] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.825894 249972 usertrap_amd64.go:212] [ 18347: 18347] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.825960 249972 usertrap_amd64.go:122] [ 18347: 18347] Allocate a new trap: 0xc008fafe90 40 D0323 21:16:48.826004 249972 usertrap_amd64.go:225] [ 18347: 18347] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.826695 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.826906 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.829601 249972 usertrap_amd64.go:212] [ 18347: 18347] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.829631 249972 usertrap_amd64.go:122] [ 18347: 18347] Allocate a new trap: 0xc008fafe90 41 D0323 21:16:48.829642 249972 usertrap_amd64.go:225] [ 18347: 18347] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.838562 249972 usertrap_amd64.go:212] [ 18347: 18347] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.838588 249972 usertrap_amd64.go:122] [ 18347: 18347] Allocate a new trap: 0xc008fafe90 42 D0323 21:16:48.838601 249972 usertrap_amd64.go:225] [ 18347: 18347] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.838999 249972 task_exit.go:204] [ 18347: 18347] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.839039 249972 task_exit.go:204] [ 18347: 18347] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.839105 249972 task_signals.go:204] [ 18347: 18348] Signal 18347, PID: 18348, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.839180 249972 task_exit.go:204] [ 18347: 18348] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.840829 249972 task_exit.go:204] [ 18347: 18348] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.840866 249972 task_exit.go:204] [ 18347: 18348] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.840880 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.842112 249972 task_exit.go:204] [ 18347: 18347] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = gettid() prlimit64(r0, 0x4, &(0x7f00000002c0)={0xfff, 0x1f}, &(0x7f0000000400)) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x4) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000001700)=0x4) sched_setscheduler(r2, 0x6, &(0x7f0000000440)=0x7fffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) r5 = socket(0x10, 0x2, 0x0) write(r5, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) D0323 21:16:48.853454 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.853627 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.860294 249972 usertrap_amd64.go:212] [ 18349: 18349] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.860327 249972 usertrap_amd64.go:122] [ 18349: 18349] Allocate a new trap: 0xc000946d20 39 D0323 21:16:48.860398 249972 usertrap_amd64.go:225] [ 18349: 18349] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.861108 249972 usertrap_amd64.go:212] [ 18349: 18349] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.861135 249972 usertrap_amd64.go:122] [ 18349: 18349] Allocate a new trap: 0xc000946d20 40 D0323 21:16:48.861146 249972 usertrap_amd64.go:225] [ 18349: 18349] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.861657 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.861800 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.868873 249972 usertrap_amd64.go:212] [ 18349: 18349] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.868900 249972 usertrap_amd64.go:122] [ 18349: 18349] Allocate a new trap: 0xc000946d20 41 D0323 21:16:48.868913 249972 usertrap_amd64.go:225] [ 18349: 18349] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.881869 249972 usertrap_amd64.go:212] [ 18349: 18349] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.881904 249972 usertrap_amd64.go:122] [ 18349: 18349] Allocate a new trap: 0xc000946d20 42 D0323 21:16:48.881921 249972 usertrap_amd64.go:225] [ 18349: 18349] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.882201 249972 task_exit.go:204] [ 18349: 18349] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.882239 249972 task_exit.go:204] [ 18349: 18349] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.882305 249972 task_signals.go:204] [ 18349: 18350] Signal 18349, PID: 18350, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.882339 249972 task_exit.go:204] [ 18349: 18350] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.883809 249972 task_exit.go:204] [ 18349: 18350] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.883838 249972 task_exit.go:204] [ 18349: 18350] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.883856 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.884193 249972 task_exit.go:204] [ 18340: 18340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.885446 249972 task_exit.go:204] [ 18349: 18349] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.885971 249972 task_exit.go:204] [ 18340: 18340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.886019 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 21:16:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x890c, &(0x7f0000000580)) D0323 21:16:48.888061 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.888258 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.891731 249972 task_exit.go:204] [ 18340: 18340] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.893661 249972 usertrap_amd64.go:212] [ 18351: 18351] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.893688 249972 usertrap_amd64.go:122] [ 18351: 18351] Allocate a new trap: 0xc0090755f0 39 D0323 21:16:48.893753 249972 usertrap_amd64.go:225] [ 18351: 18351] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.894158 249972 usertrap_amd64.go:212] [ 18351: 18351] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.894185 249972 usertrap_amd64.go:122] [ 18351: 18351] Allocate a new trap: 0xc0090755f0 40 D0323 21:16:48.894196 249972 usertrap_amd64.go:225] [ 18351: 18351] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.894628 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.894822 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.897201 249972 usertrap_amd64.go:212] [ 18351: 18351] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.897260 249972 usertrap_amd64.go:122] [ 18351: 18351] Allocate a new trap: 0xc0090755f0 41 D0323 21:16:48.897286 249972 usertrap_amd64.go:225] [ 18351: 18351] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.905347 249972 usertrap_amd64.go:212] [ 18351: 18351] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.905416 249972 usertrap_amd64.go:122] [ 18351: 18351] Allocate a new trap: 0xc0090755f0 42 D0323 21:16:48.905444 249972 usertrap_amd64.go:225] [ 18351: 18351] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.905713 249972 task_exit.go:204] [ 18351: 18351] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.905744 249972 task_exit.go:204] [ 18351: 18351] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.905795 249972 task_signals.go:204] [ 18351: 18352] Signal 18351, PID: 18352, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.905827 249972 task_exit.go:204] [ 18351: 18352] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.907474 249972 task_exit.go:204] [ 18351: 18352] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.907607 249972 task_exit.go:204] [ 18351: 18352] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.907634 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.908609 249972 task_exit.go:204] [ 18351: 18351] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0x20}, {r2}, {r1, 0x1ea}], 0x3, 0x0) D0323 21:16:48.909902 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.910043 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.923426 249972 usertrap_amd64.go:212] [ 18353: 18353] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.923455 249972 usertrap_amd64.go:122] [ 18353: 18353] Allocate a new trap: 0xc007fab440 39 D0323 21:16:48.923562 249972 usertrap_amd64.go:225] [ 18353: 18353] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.924059 249972 usertrap_amd64.go:212] [ 18353: 18353] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.924073 249972 usertrap_amd64.go:122] [ 18353: 18353] Allocate a new trap: 0xc007fab440 40 D0323 21:16:48.924081 249972 usertrap_amd64.go:225] [ 18353: 18353] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.925009 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.925225 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.931158 249972 usertrap_amd64.go:212] [ 18353: 18353] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.931234 249972 usertrap_amd64.go:122] [ 18353: 18353] Allocate a new trap: 0xc007fab440 41 D0323 21:16:48.931288 249972 usertrap_amd64.go:225] [ 18353: 18353] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.941436 249972 usertrap_amd64.go:212] [ 18353: 18353] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.941515 249972 usertrap_amd64.go:122] [ 18353: 18353] Allocate a new trap: 0xc007fab440 42 D0323 21:16:48.941532 249972 usertrap_amd64.go:225] [ 18353: 18353] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.941876 249972 task_exit.go:204] [ 18353: 18353] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.941913 249972 task_exit.go:204] [ 18353: 18353] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.941966 249972 task_signals.go:204] [ 18353: 18354] Signal 18353, PID: 18354, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.941987 249972 task_exit.go:204] [ 18353: 18354] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.943286 249972 task_exit.go:204] [ 18353: 18354] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.943324 249972 task_exit.go:204] [ 18353: 18354] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.943339 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.943744 249972 task_exit.go:204] [ 18353: 18353] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000700)=""/171, 0xab}, {&(0x7f00000007c0)=""/19, 0x13}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000001740)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) D0323 21:16:48.949560 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.949693 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.962941 249972 usertrap_amd64.go:212] [ 18355: 18355] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.963214 249972 usertrap_amd64.go:122] [ 18355: 18355] Allocate a new trap: 0xc009075740 39 D0323 21:16:48.963476 249972 usertrap_amd64.go:225] [ 18355: 18355] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.964662 249972 usertrap_amd64.go:212] [ 18355: 18355] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.964693 249972 usertrap_amd64.go:122] [ 18355: 18355] Allocate a new trap: 0xc009075740 40 D0323 21:16:48.964703 249972 usertrap_amd64.go:225] [ 18355: 18355] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.965104 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.965278 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.968147 249972 usertrap_amd64.go:212] [ 18355: 18355] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:48.968220 249972 usertrap_amd64.go:122] [ 18355: 18355] Allocate a new trap: 0xc009075740 41 D0323 21:16:48.968236 249972 usertrap_amd64.go:225] [ 18355: 18355] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:48.978248 249972 usertrap_amd64.go:212] [ 18355: 18355] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:48.978274 249972 usertrap_amd64.go:122] [ 18355: 18355] Allocate a new trap: 0xc009075740 42 D0323 21:16:48.978286 249972 usertrap_amd64.go:225] [ 18355: 18355] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:48.978948 249972 task_exit.go:204] [ 18355: 18355] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.979006 249972 task_signals.go:204] [ 18355: 18356] Signal 18355, PID: 18356, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:48.979026 249972 task_exit.go:204] [ 18355: 18355] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.979103 249972 task_exit.go:204] [ 18355: 18356] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:48.981775 249972 task_exit.go:204] [ 18355: 18356] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:48.981816 249972 task_exit.go:204] [ 18355: 18356] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:48.981837 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:48.982406 249972 task_exit.go:204] [ 18355: 18355] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:48 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x6) D0323 21:16:48.984545 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:48.984721 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:48.996256 249972 usertrap_amd64.go:212] [ 18357: 18357] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:48.996295 249972 usertrap_amd64.go:122] [ 18357: 18357] Allocate a new trap: 0xc00307f320 39 D0323 21:16:48.996381 249972 usertrap_amd64.go:225] [ 18357: 18357] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:48.997119 249972 usertrap_amd64.go:212] [ 18357: 18357] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:48.997144 249972 usertrap_amd64.go:122] [ 18357: 18357] Allocate a new trap: 0xc00307f320 40 D0323 21:16:48.997154 249972 usertrap_amd64.go:225] [ 18357: 18357] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:48.997553 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:48.997745 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.001167 249972 usertrap_amd64.go:212] [ 18357: 18357] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.001192 249972 usertrap_amd64.go:122] [ 18357: 18357] Allocate a new trap: 0xc00307f320 41 D0323 21:16:49.001226 249972 usertrap_amd64.go:225] [ 18357: 18357] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.006360 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.006553 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.010085 249972 usertrap_amd64.go:212] [ 18357: 18357] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.010121 249972 usertrap_amd64.go:122] [ 18357: 18357] Allocate a new trap: 0xc00307f320 42 D0323 21:16:49.010134 249972 usertrap_amd64.go:225] [ 18357: 18357] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.010580 249972 task_exit.go:204] [ 18357: 18357] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.010621 249972 task_exit.go:204] [ 18357: 18357] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.010665 249972 task_signals.go:204] [ 18357: 18358] Signal 18357, PID: 18358, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.010764 249972 task_exit.go:204] [ 18357: 18358] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.011450 249972 task_exit.go:204] [ 18357: 18358] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.011478 249972 task_exit.go:204] [ 18357: 18358] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.011492 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.012576 249972 task_exit.go:204] [ 18357: 18357] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x6003, 0x0) D0323 21:16:49.014326 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.014462 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.025306 249972 usertrap_amd64.go:212] [ 18359: 18359] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.025332 249972 usertrap_amd64.go:122] [ 18359: 18359] Allocate a new trap: 0xc00307f470 39 D0323 21:16:49.025532 249972 usertrap_amd64.go:225] [ 18359: 18359] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.026614 249972 usertrap_amd64.go:212] [ 18359: 18359] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.026637 249972 usertrap_amd64.go:122] [ 18359: 18359] Allocate a new trap: 0xc00307f470 40 D0323 21:16:49.026646 249972 usertrap_amd64.go:225] [ 18359: 18359] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.027237 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.027381 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.030749 249972 usertrap_amd64.go:212] [ 18359: 18359] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.030780 249972 usertrap_amd64.go:122] [ 18359: 18359] Allocate a new trap: 0xc00307f470 41 D0323 21:16:49.030793 249972 usertrap_amd64.go:225] [ 18359: 18359] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.036448 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.036606 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.037084 249972 usertrap_amd64.go:212] [ 18359: 18359] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.037111 249972 usertrap_amd64.go:122] [ 18359: 18359] Allocate a new trap: 0xc00307f470 42 D0323 21:16:49.037122 249972 usertrap_amd64.go:225] [ 18359: 18359] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.037503 249972 task_exit.go:204] [ 18359: 18359] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.037544 249972 task_exit.go:204] [ 18359: 18359] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.037586 249972 task_signals.go:204] [ 18359: 18360] Signal 18359, PID: 18360, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.037611 249972 task_exit.go:204] [ 18359: 18360] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.039056 249972 task_exit.go:204] [ 18359: 18360] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.039084 249972 task_exit.go:204] [ 18359: 18360] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.039104 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.041211 249972 task_exit.go:204] [ 18359: 18359] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: socketpair(0x2, 0x1, 0x6, &(0x7f0000000d40)) D0323 21:16:49.042243 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.042360 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.051780 249972 usertrap_amd64.go:212] [ 18361: 18361] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.051812 249972 usertrap_amd64.go:122] [ 18361: 18361] Allocate a new trap: 0xc000946fc0 39 D0323 21:16:49.051905 249972 usertrap_amd64.go:225] [ 18361: 18361] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.052356 249972 usertrap_amd64.go:212] [ 18361: 18361] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.052371 249972 usertrap_amd64.go:122] [ 18361: 18361] Allocate a new trap: 0xc000946fc0 40 D0323 21:16:49.052378 249972 usertrap_amd64.go:225] [ 18361: 18361] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.052849 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.053061 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.057204 249972 usertrap_amd64.go:212] [ 18361: 18361] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.057230 249972 usertrap_amd64.go:122] [ 18361: 18361] Allocate a new trap: 0xc000946fc0 41 D0323 21:16:49.057241 249972 usertrap_amd64.go:225] [ 18361: 18361] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.069955 249972 usertrap_amd64.go:212] [ 18361: 18361] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.069980 249972 usertrap_amd64.go:122] [ 18361: 18361] Allocate a new trap: 0xc000946fc0 42 D0323 21:16:49.069989 249972 usertrap_amd64.go:225] [ 18361: 18361] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.075845 249972 task_exit.go:204] [ 18361: 18361] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.075905 249972 task_exit.go:204] [ 18361: 18361] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.075968 249972 task_signals.go:204] [ 18361: 18362] Signal 18361, PID: 18362, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.075992 249972 task_exit.go:204] [ 18361: 18362] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.077793 249972 task_exit.go:204] [ 18361: 18362] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.077903 249972 task_exit.go:204] [ 18361: 18362] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.077937 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.078889 249972 task_exit.go:204] [ 18361: 18361] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x3c, 0x0, &(0x7f0000000040)) D0323 21:16:49.081975 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.082162 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.096904 249972 usertrap_amd64.go:212] [ 18363: 18363] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.096962 249972 usertrap_amd64.go:122] [ 18363: 18363] Allocate a new trap: 0xc007fab4a0 39 D0323 21:16:49.097041 249972 usertrap_amd64.go:225] [ 18363: 18363] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.099705 249972 usertrap_amd64.go:212] [ 18363: 18363] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.099814 249972 usertrap_amd64.go:122] [ 18363: 18363] Allocate a new trap: 0xc007fab4a0 40 D0323 21:16:49.099919 249972 usertrap_amd64.go:225] [ 18363: 18363] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.101150 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.101718 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.107345 249972 usertrap_amd64.go:212] [ 18363: 18363] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.107379 249972 usertrap_amd64.go:122] [ 18363: 18363] Allocate a new trap: 0xc007fab4a0 41 D0323 21:16:49.107390 249972 usertrap_amd64.go:225] [ 18363: 18363] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.119241 249972 usertrap_amd64.go:212] [ 18363: 18363] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.119281 249972 usertrap_amd64.go:122] [ 18363: 18363] Allocate a new trap: 0xc007fab4a0 42 D0323 21:16:49.119956 249972 usertrap_amd64.go:225] [ 18363: 18363] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.120460 249972 task_exit.go:204] [ 18363: 18363] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.120502 249972 task_exit.go:204] [ 18363: 18363] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.120602 249972 task_signals.go:204] [ 18363: 18364] Signal 18363, PID: 18364, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.120699 249972 task_exit.go:204] [ 18363: 18364] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.122526 249972 task_exit.go:204] [ 18363: 18364] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.122559 249972 task_exit.go:204] [ 18363: 18364] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.122579 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.123155 249972 task_exit.go:204] [ 18363: 18363] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x3e, 0x0, &(0x7f0000000040)) D0323 21:16:49.125887 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.127410 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.137713 249972 usertrap_amd64.go:212] [ 18365: 18365] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.137756 249972 usertrap_amd64.go:122] [ 18365: 18365] Allocate a new trap: 0xc007fab4d0 39 D0323 21:16:49.137898 249972 usertrap_amd64.go:225] [ 18365: 18365] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.138709 249972 usertrap_amd64.go:212] [ 18365: 18365] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.138744 249972 usertrap_amd64.go:122] [ 18365: 18365] Allocate a new trap: 0xc007fab4d0 40 D0323 21:16:49.138760 249972 usertrap_amd64.go:225] [ 18365: 18365] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.140312 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.140832 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.145832 249972 usertrap_amd64.go:212] [ 18365: 18365] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.145860 249972 usertrap_amd64.go:122] [ 18365: 18365] Allocate a new trap: 0xc007fab4d0 41 D0323 21:16:49.145872 249972 usertrap_amd64.go:225] [ 18365: 18365] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.152503 249972 usertrap_amd64.go:212] [ 18365: 18365] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.152543 249972 usertrap_amd64.go:122] [ 18365: 18365] Allocate a new trap: 0xc007fab4d0 42 D0323 21:16:49.152575 249972 usertrap_amd64.go:225] [ 18365: 18365] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.153288 249972 task_exit.go:204] [ 18365: 18365] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.153321 249972 task_exit.go:204] [ 18365: 18365] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.153346 249972 task_signals.go:204] [ 18365: 18366] Signal 18365, PID: 18366, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.153397 249972 task_exit.go:204] [ 18365: 18366] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.154873 249972 task_exit.go:204] [ 18365: 18366] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.154913 249972 task_exit.go:204] [ 18365: 18366] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.154928 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.155732 249972 task_exit.go:204] [ 18365: 18365] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) signalfd(r0, &(0x7f00000000c0), 0x8) D0323 21:16:49.158892 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.159057 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.169516 249972 usertrap_amd64.go:212] [ 18367: 18367] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.169610 249972 usertrap_amd64.go:122] [ 18367: 18367] Allocate a new trap: 0xc007fab5c0 39 D0323 21:16:49.169718 249972 usertrap_amd64.go:225] [ 18367: 18367] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.170348 249972 usertrap_amd64.go:212] [ 18367: 18367] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.170375 249972 usertrap_amd64.go:122] [ 18367: 18367] Allocate a new trap: 0xc007fab5c0 40 D0323 21:16:49.170387 249972 usertrap_amd64.go:225] [ 18367: 18367] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.170946 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.171172 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.175776 249972 usertrap_amd64.go:212] [ 18367: 18367] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.175809 249972 usertrap_amd64.go:122] [ 18367: 18367] Allocate a new trap: 0xc007fab5c0 41 D0323 21:16:49.175824 249972 usertrap_amd64.go:225] [ 18367: 18367] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.182065 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.185137 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.187418 249972 usertrap_amd64.go:212] [ 18367: 18367] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:49.187445 249972 usertrap_amd64.go:122] [ 18367: 18367] Allocate a new trap: 0xc007fab5c0 42 D0323 21:16:49.187456 249972 usertrap_amd64.go:225] [ 18367: 18367] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:49.187719 249972 task_exit.go:204] [ 18367: 18367] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.187798 249972 task_exit.go:204] [ 18367: 18367] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.188470 249972 task_signals.go:204] [ 18367: 18368] Signal 18367, PID: 18368, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:49.188499 249972 task_exit.go:204] [ 18367: 18368] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:49.189562 249972 task_exit.go:204] [ 18367: 18368] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:49.189615 249972 task_exit.go:204] [ 18367: 18368] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:49.189637 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:49.189738 249972 task_exit.go:204] [ 18367: 18367] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) read$FUSE(r0, &(0x7f0000002e40)={0x2020}, 0x2020) D0323 21:16:49.190582 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:49.191098 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.200979 249972 usertrap_amd64.go:212] [ 18369: 18369] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:49.201014 249972 usertrap_amd64.go:122] [ 18369: 18369] Allocate a new trap: 0xc0038be3c0 39 D0323 21:16:49.201109 249972 usertrap_amd64.go:225] [ 18369: 18369] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:49.201547 249972 usertrap_amd64.go:212] [ 18369: 18369] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:49.201569 249972 usertrap_amd64.go:122] [ 18369: 18369] Allocate a new trap: 0xc0038be3c0 40 D0323 21:16:49.201578 249972 usertrap_amd64.go:225] [ 18369: 18369] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:49.202211 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:49.202377 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:49.205637 249972 usertrap_amd64.go:212] [ 18369: 18369] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:49.205666 249972 usertrap_amd64.go:122] [ 18369: 18369] Allocate a new trap: 0xc0038be3c0 41 D0323 21:16:49.205677 249972 usertrap_amd64.go:225] [ 18369: 18369] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:49.262779 249972 usertrap_amd64.go:212] [ 18369: 18369] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:49.262818 249972 usertrap_amd64.go:122] [ 18369: 18369] Allocate a new trap: 0xc0038be3c0 42 D0323 21:16:49.262835 249972 usertrap_amd64.go:225] [ 18369: 18369] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.037061 249972 usertrap_amd64.go:212] [ 18369: 18369] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.037107 249972 usertrap_amd64.go:122] [ 18369: 18369] Allocate a new trap: 0xc0038be3c0 43 D0323 21:16:50.037122 249972 usertrap_amd64.go:225] [ 18369: 18369] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:50.037517 249972 task_exit.go:204] [ 18369: 18369] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.037551 249972 task_exit.go:204] [ 18369: 18369] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.037632 249972 task_signals.go:204] [ 18369: 18370] Signal 18369, PID: 18370, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.037666 249972 task_exit.go:204] [ 18369: 18370] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.045285 249972 task_exit.go:204] [ 18369: 18370] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.045318 249972 task_exit.go:204] [ 18369: 18370] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.045371 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.046369 249972 task_exit.go:204] [ 18369: 18369] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.047318 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:50 executing program 0: syz_clone(0xe37214ab59047639, 0x0, 0x4f, 0x0, 0x0, 0x0) D0323 21:16:50.047468 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.059821 249972 usertrap_amd64.go:212] [ 18371: 18371] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.059869 249972 usertrap_amd64.go:122] [ 18371: 18371] Allocate a new trap: 0xc000947470 39 D0323 21:16:50.060002 249972 usertrap_amd64.go:225] [ 18371: 18371] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.061584 249972 usertrap_amd64.go:212] [ 18371: 18371] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.061612 249972 usertrap_amd64.go:122] [ 18371: 18371] Allocate a new trap: 0xc000947470 40 D0323 21:16:50.061625 249972 usertrap_amd64.go:225] [ 18371: 18371] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.064125 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.064374 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.072804 249972 usertrap_amd64.go:212] [ 18371: 18371] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.072827 249972 usertrap_amd64.go:122] [ 18371: 18371] Allocate a new trap: 0xc000947470 41 D0323 21:16:50.072840 249972 usertrap_amd64.go:225] [ 18371: 18371] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.082879 249972 usertrap_amd64.go:212] [ 18371: 18371] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.082908 249972 usertrap_amd64.go:122] [ 18371: 18371] Allocate a new trap: 0xc000947470 42 D0323 21:16:50.082920 249972 usertrap_amd64.go:225] [ 18371: 18371] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.083226 249972 task_exit.go:204] [ 18371: 18371] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.083253 249972 task_exit.go:204] [ 18371: 18371] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.083266 249972 task_signals.go:204] [ 18371: 18372] Signal 18371, PID: 18372, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.083302 249972 task_exit.go:204] [ 18371: 18372] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.084634 249972 task_exit.go:204] [ 18371: 18372] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.084658 249972 task_exit.go:204] [ 18371: 18372] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.084668 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.085615 249972 task_exit.go:204] [ 18371: 18371] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: sched_rr_get_interval(0x0, &(0x7f00000011c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) D0323 21:16:50.086650 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.086815 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.093675 249972 usertrap_amd64.go:212] [ 18373: 18373] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.093705 249972 usertrap_amd64.go:122] [ 18373: 18373] Allocate a new trap: 0xc009075e30 39 D0323 21:16:50.093788 249972 usertrap_amd64.go:225] [ 18373: 18373] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.094232 249972 usertrap_amd64.go:212] [ 18373: 18373] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.094253 249972 usertrap_amd64.go:122] [ 18373: 18373] Allocate a new trap: 0xc009075e30 40 D0323 21:16:50.094262 249972 usertrap_amd64.go:225] [ 18373: 18373] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.094660 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.094808 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.097968 249972 usertrap_amd64.go:212] [ 18373: 18373] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.097996 249972 usertrap_amd64.go:122] [ 18373: 18373] Allocate a new trap: 0xc009075e30 41 D0323 21:16:50.098007 249972 usertrap_amd64.go:225] [ 18373: 18373] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.104780 249972 usertrap_amd64.go:212] [ 18373: 18373] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.104828 249972 usertrap_amd64.go:122] [ 18373: 18373] Allocate a new trap: 0xc009075e30 42 D0323 21:16:50.104848 249972 usertrap_amd64.go:225] [ 18373: 18373] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.105167 249972 task_exit.go:204] [ 18373: 18373] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.105201 249972 task_exit.go:204] [ 18373: 18373] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.105200 249972 task_signals.go:204] [ 18373: 18374] Signal 18373, PID: 18374, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.105221 249972 task_exit.go:204] [ 18373: 18374] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.107053 249972 task_exit.go:204] [ 18373: 18374] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.107091 249972 task_exit.go:204] [ 18373: 18374] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.107108 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.108368 249972 task_exit.go:204] [ 18373: 18373] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: clock_gettime(0x6b3f63dcf1b58281, 0x0) D0323 21:16:50.109587 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.109754 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.117293 249972 usertrap_amd64.go:212] [ 18375: 18375] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.117318 249972 usertrap_amd64.go:122] [ 18375: 18375] Allocate a new trap: 0xc007b08990 39 D0323 21:16:50.117390 249972 usertrap_amd64.go:225] [ 18375: 18375] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.117789 249972 usertrap_amd64.go:212] [ 18375: 18375] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.117805 249972 usertrap_amd64.go:122] [ 18375: 18375] Allocate a new trap: 0xc007b08990 40 D0323 21:16:50.117811 249972 usertrap_amd64.go:225] [ 18375: 18375] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.118094 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.118235 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.121197 249972 usertrap_amd64.go:212] [ 18375: 18375] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.121221 249972 usertrap_amd64.go:122] [ 18375: 18375] Allocate a new trap: 0xc007b08990 41 D0323 21:16:50.121229 249972 usertrap_amd64.go:225] [ 18375: 18375] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.125850 249972 usertrap_amd64.go:212] [ 18375: 18375] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.125878 249972 usertrap_amd64.go:122] [ 18375: 18375] Allocate a new trap: 0xc007b08990 42 D0323 21:16:50.125889 249972 usertrap_amd64.go:225] [ 18375: 18375] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.126250 249972 task_exit.go:204] [ 18375: 18375] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.126280 249972 task_exit.go:204] [ 18375: 18375] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.126318 249972 task_signals.go:204] [ 18375: 18376] Signal 18375, PID: 18376, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.126340 249972 task_exit.go:204] [ 18375: 18376] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.127673 249972 task_exit.go:204] [ 18375: 18376] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.127697 249972 task_exit.go:204] [ 18375: 18376] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.127713 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.128746 249972 task_exit.go:204] [ 18375: 18375] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev}}) D0323 21:16:50.129653 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.129757 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.138753 249972 usertrap_amd64.go:212] [ 18377: 18377] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.138778 249972 usertrap_amd64.go:122] [ 18377: 18377] Allocate a new trap: 0xc007fab6b0 39 D0323 21:16:50.138893 249972 usertrap_amd64.go:225] [ 18377: 18377] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.139598 249972 usertrap_amd64.go:212] [ 18377: 18377] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.139621 249972 usertrap_amd64.go:122] [ 18377: 18377] Allocate a new trap: 0xc007fab6b0 40 D0323 21:16:50.139632 249972 usertrap_amd64.go:225] [ 18377: 18377] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.140106 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.140283 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.142482 249972 usertrap_amd64.go:212] [ 18377: 18377] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.142512 249972 usertrap_amd64.go:122] [ 18377: 18377] Allocate a new trap: 0xc007fab6b0 41 D0323 21:16:50.142524 249972 usertrap_amd64.go:225] [ 18377: 18377] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.152700 249972 usertrap_amd64.go:212] [ 18377: 18377] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.152728 249972 usertrap_amd64.go:122] [ 18377: 18377] Allocate a new trap: 0xc007fab6b0 42 D0323 21:16:50.152741 249972 usertrap_amd64.go:225] [ 18377: 18377] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.153073 249972 task_exit.go:204] [ 18377: 18377] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.153097 249972 task_exit.go:204] [ 18377: 18377] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.153106 249972 task_signals.go:204] [ 18377: 18378] Signal 18377, PID: 18378, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.153127 249972 task_exit.go:204] [ 18377: 18378] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.154789 249972 task_exit.go:204] [ 18377: 18378] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.154824 249972 task_exit.go:204] [ 18377: 18378] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.154837 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.156156 249972 task_exit.go:204] [ 18377: 18377] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.156852 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.157012 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:50 executing program 0: syz_clone(0x4104200, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) D0323 21:16:50.164148 249972 usertrap_amd64.go:212] [ 18379: 18379] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.164179 249972 usertrap_amd64.go:122] [ 18379: 18379] Allocate a new trap: 0xc00307f980 39 D0323 21:16:50.164298 249972 usertrap_amd64.go:225] [ 18379: 18379] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.164864 249972 usertrap_amd64.go:212] [ 18379: 18379] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.164885 249972 usertrap_amd64.go:122] [ 18379: 18379] Allocate a new trap: 0xc00307f980 40 D0323 21:16:50.164898 249972 usertrap_amd64.go:225] [ 18379: 18379] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.165363 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.165517 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.167597 249972 usertrap_amd64.go:212] [ 18379: 18379] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.167617 249972 usertrap_amd64.go:122] [ 18379: 18379] Allocate a new trap: 0xc00307f980 41 D0323 21:16:50.167625 249972 usertrap_amd64.go:225] [ 18379: 18379] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.173727 249972 task_stop.go:118] [ 18379: 18380] Entering internal stop (*kernel.vforkStop)(nil) D0323 21:16:50.181103 249972 usertrap_amd64.go:212] [ 18381: 18381] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:50.181131 249972 usertrap_amd64.go:122] [ 18381: 18381] Allocate a new trap: 0xc007fab920 42 D0323 21:16:50.181246 249972 usertrap_amd64.go:225] [ 18381: 18381] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.220316 249972 usertrap_amd64.go:212] [ 18379: 18379] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:50.220351 249972 usertrap_amd64.go:122] [ 18379: 18379] Allocate a new trap: 0xc00307f980 42 D0323 21:16:50.220368 249972 usertrap_amd64.go:225] [ 18379: 18379] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.337697 249972 task_exit.go:204] [ 18381: 18381] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.338012 249972 task_stop.go:138] [ 18379: 18380] Leaving internal stop (*kernel.vforkStop)(nil) D0323 21:16:50.338087 249972 task_exit.go:204] [ 18381: 18381] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.341629 249972 usertrap_amd64.go:212] [ 18379: 18379] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.341662 249972 usertrap_amd64.go:122] [ 18379: 18379] Allocate a new trap: 0xc00307f980 43 D0323 21:16:50.341677 249972 usertrap_amd64.go:225] [ 18379: 18379] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:50.342111 249972 task_exit.go:204] [ 18379: 18379] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.342149 249972 task_exit.go:204] [ 18379: 18379] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.342256 249972 task_signals.go:204] [ 18379: 18380] Signal 18379, PID: 18380, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.342292 249972 task_exit.go:204] [ 18379: 18380] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.343747 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.343789 249972 task_exit.go:204] [ 18379: 18380] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.343803 249972 task_exit.go:204] [ 18379: 18380] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.343814 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.345221 249972 task_exit.go:204] [ 18379: 18379] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x21, 0x0, &(0x7f0000000040)) D0323 21:16:50.348135 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.348333 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.351083 249972 task_exit.go:204] [ 18381: 18381] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.359901 249972 usertrap_amd64.go:212] [ 18382: 18382] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.359930 249972 usertrap_amd64.go:122] [ 18382: 18382] Allocate a new trap: 0xc00307f9b0 39 D0323 21:16:50.360038 249972 usertrap_amd64.go:225] [ 18382: 18382] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.361457 249972 usertrap_amd64.go:212] [ 18382: 18382] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.361481 249972 usertrap_amd64.go:122] [ 18382: 18382] Allocate a new trap: 0xc00307f9b0 40 D0323 21:16:50.361494 249972 usertrap_amd64.go:225] [ 18382: 18382] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.370054 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.370306 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.377161 249972 usertrap_amd64.go:212] [ 18382: 18382] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.377224 249972 usertrap_amd64.go:122] [ 18382: 18382] Allocate a new trap: 0xc00307f9b0 41 D0323 21:16:50.377247 249972 usertrap_amd64.go:225] [ 18382: 18382] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.389595 249972 usertrap_amd64.go:212] [ 18382: 18382] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.389658 249972 usertrap_amd64.go:122] [ 18382: 18382] Allocate a new trap: 0xc00307f9b0 42 D0323 21:16:50.389700 249972 usertrap_amd64.go:225] [ 18382: 18382] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.390371 249972 task_exit.go:204] [ 18382: 18382] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.390411 249972 task_exit.go:204] [ 18382: 18382] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.390492 249972 task_signals.go:204] [ 18382: 18383] Signal 18382, PID: 18383, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.390547 249972 task_exit.go:204] [ 18382: 18383] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.394000 249972 task_exit.go:204] [ 18382: 18383] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.394107 249972 task_exit.go:204] [ 18382: 18383] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.394143 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.394293 249972 task_exit.go:204] [ 18382: 18382] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: syz_emit_ethernet(0x16, &(0x7f0000000000)={@local, @dev, @void, {@llc={0x4, {@snap={0x0, 0x0, "e0", "aae9b8"}}}}}, 0x0) D0323 21:16:50.398013 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.398184 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.410079 249972 usertrap_amd64.go:212] [ 18384: 18384] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.410178 249972 usertrap_amd64.go:122] [ 18384: 18384] Allocate a new trap: 0xc000947800 39 D0323 21:16:50.410720 249972 usertrap_amd64.go:225] [ 18384: 18384] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.412002 249972 usertrap_amd64.go:212] [ 18384: 18384] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.412039 249972 usertrap_amd64.go:122] [ 18384: 18384] Allocate a new trap: 0xc000947800 40 D0323 21:16:50.412056 249972 usertrap_amd64.go:225] [ 18384: 18384] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.413391 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.413591 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.420708 249972 usertrap_amd64.go:212] [ 18384: 18384] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.420728 249972 usertrap_amd64.go:122] [ 18384: 18384] Allocate a new trap: 0xc000947800 41 D0323 21:16:50.420742 249972 usertrap_amd64.go:225] [ 18384: 18384] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.427879 249972 usertrap_amd64.go:212] [ 18384: 18385] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:50.427902 249972 usertrap_amd64.go:122] [ 18384: 18385] Allocate a new trap: 0xc000947800 42 D0323 21:16:50.427910 249972 usertrap_amd64.go:225] [ 18384: 18385] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.430073 249972 usertrap_amd64.go:212] [ 18384: 18384] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.430109 249972 usertrap_amd64.go:122] [ 18384: 18384] Allocate a new trap: 0xc000947800 43 D0323 21:16:50.430123 249972 usertrap_amd64.go:225] [ 18384: 18384] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:50.436474 249972 task_exit.go:204] [ 18384: 18384] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.436516 249972 task_exit.go:204] [ 18384: 18384] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.436587 249972 task_signals.go:204] [ 18384: 18385] Signal 18384, PID: 18385, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.436626 249972 task_exit.go:204] [ 18384: 18385] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.438949 249972 task_exit.go:204] [ 18384: 18385] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.438972 249972 task_exit.go:204] [ 18384: 18385] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.438984 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.439108 249972 task_exit.go:204] [ 18384: 18384] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1e, 0x0, &(0x7f0000000040)) D0323 21:16:50.449703 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.449860 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.461124 249972 usertrap_amd64.go:212] [ 18386: 18386] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.461223 249972 usertrap_amd64.go:122] [ 18386: 18386] Allocate a new trap: 0xc007b08c90 39 D0323 21:16:50.461365 249972 usertrap_amd64.go:225] [ 18386: 18386] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.462295 249972 usertrap_amd64.go:212] [ 18386: 18386] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.462321 249972 usertrap_amd64.go:122] [ 18386: 18386] Allocate a new trap: 0xc007b08c90 40 D0323 21:16:50.462333 249972 usertrap_amd64.go:225] [ 18386: 18386] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.462865 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.463042 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.466216 249972 usertrap_amd64.go:212] [ 18386: 18386] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.466250 249972 usertrap_amd64.go:122] [ 18386: 18386] Allocate a new trap: 0xc007b08c90 41 D0323 21:16:50.466265 249972 usertrap_amd64.go:225] [ 18386: 18386] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.472566 249972 usertrap_amd64.go:212] [ 18386: 18386] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.472658 249972 usertrap_amd64.go:122] [ 18386: 18386] Allocate a new trap: 0xc007b08c90 42 D0323 21:16:50.472716 249972 usertrap_amd64.go:225] [ 18386: 18386] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.473348 249972 task_exit.go:204] [ 18386: 18386] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.473385 249972 task_exit.go:204] [ 18386: 18386] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.473448 249972 task_signals.go:204] [ 18386: 18387] Signal 18386, PID: 18387, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.473901 249972 task_exit.go:204] [ 18386: 18387] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.475084 249972 task_exit.go:204] [ 18386: 18387] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.475215 249972 task_exit.go:204] [ 18386: 18387] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.475290 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.475459 249972 task_exit.go:204] [ 18386: 18386] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000040)={{0x0, 0x2710}, {0x0, r0/1000+60000}}, 0x0) clock_gettime(0x2, &(0x7f0000000180)) D0323 21:16:50.486395 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.486638 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.498931 249972 usertrap_amd64.go:212] [ 18388: 18388] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.498963 249972 usertrap_amd64.go:122] [ 18388: 18388] Allocate a new trap: 0xc000947950 39 D0323 21:16:50.499693 249972 usertrap_amd64.go:225] [ 18388: 18388] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.500739 249972 usertrap_amd64.go:212] [ 18388: 18388] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.500763 249972 usertrap_amd64.go:122] [ 18388: 18388] Allocate a new trap: 0xc000947950 40 D0323 21:16:50.500771 249972 usertrap_amd64.go:225] [ 18388: 18388] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.501281 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.501509 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.505065 249972 usertrap_amd64.go:212] [ 18388: 18388] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.505104 249972 usertrap_amd64.go:122] [ 18388: 18388] Allocate a new trap: 0xc000947950 41 D0323 21:16:50.505121 249972 usertrap_amd64.go:225] [ 18388: 18388] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.523545 249972 usertrap_amd64.go:212] [ 18388: 18388] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.523575 249972 usertrap_amd64.go:122] [ 18388: 18388] Allocate a new trap: 0xc000947950 42 D0323 21:16:50.523590 249972 usertrap_amd64.go:225] [ 18388: 18388] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.525110 249972 task_exit.go:204] [ 18388: 18388] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.525197 249972 task_exit.go:204] [ 18388: 18388] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.525253 249972 task_signals.go:204] [ 18388: 18389] Signal 18388, PID: 18389, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.525275 249972 task_exit.go:204] [ 18388: 18389] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.528815 249972 task_exit.go:204] [ 18388: 18389] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.529416 249972 task_exit.go:204] [ 18388: 18389] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.529443 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.531049 249972 task_exit.go:204] [ 18388: 18388] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x4c, 0x0, &(0x7f0000000040)) D0323 21:16:50.533258 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.533493 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.545448 249972 usertrap_amd64.go:212] [ 18390: 18390] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.545471 249972 usertrap_amd64.go:122] [ 18390: 18390] Allocate a new trap: 0xc0065ae0f0 39 D0323 21:16:50.545550 249972 usertrap_amd64.go:225] [ 18390: 18390] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.546202 249972 usertrap_amd64.go:212] [ 18390: 18390] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.546215 249972 usertrap_amd64.go:122] [ 18390: 18390] Allocate a new trap: 0xc0065ae0f0 40 D0323 21:16:50.546223 249972 usertrap_amd64.go:225] [ 18390: 18390] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.547426 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.547732 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.553369 249972 usertrap_amd64.go:212] [ 18390: 18390] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.553392 249972 usertrap_amd64.go:122] [ 18390: 18390] Allocate a new trap: 0xc0065ae0f0 41 D0323 21:16:50.553402 249972 usertrap_amd64.go:225] [ 18390: 18390] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.562217 249972 usertrap_amd64.go:212] [ 18390: 18390] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.562260 249972 usertrap_amd64.go:122] [ 18390: 18390] Allocate a new trap: 0xc0065ae0f0 42 D0323 21:16:50.562275 249972 usertrap_amd64.go:225] [ 18390: 18390] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.562643 249972 task_exit.go:204] [ 18390: 18390] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.562686 249972 task_exit.go:204] [ 18390: 18390] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.562779 249972 task_signals.go:204] [ 18390: 18391] Signal 18390, PID: 18391, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.562815 249972 task_exit.go:204] [ 18390: 18391] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.564398 249972 task_exit.go:204] [ 18390: 18391] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.564442 249972 task_exit.go:204] [ 18390: 18391] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.564458 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.566008 249972 task_exit.go:204] [ 18390: 18390] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x4, 0x0, &(0x7f0000000040)) D0323 21:16:50.568808 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.568968 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.579539 249972 usertrap_amd64.go:212] [ 18392: 18392] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.579572 249972 usertrap_amd64.go:122] [ 18392: 18392] Allocate a new trap: 0xc007b08e40 39 D0323 21:16:50.579687 249972 usertrap_amd64.go:225] [ 18392: 18392] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.580802 249972 usertrap_amd64.go:212] [ 18392: 18392] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.580862 249972 usertrap_amd64.go:122] [ 18392: 18392] Allocate a new trap: 0xc007b08e40 40 D0323 21:16:50.580884 249972 usertrap_amd64.go:225] [ 18392: 18392] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.581764 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.582026 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.584388 249972 usertrap_amd64.go:212] [ 18392: 18392] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.584430 249972 usertrap_amd64.go:122] [ 18392: 18392] Allocate a new trap: 0xc007b08e40 41 D0323 21:16:50.584444 249972 usertrap_amd64.go:225] [ 18392: 18392] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.593473 249972 usertrap_amd64.go:212] [ 18392: 18392] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.593512 249972 usertrap_amd64.go:122] [ 18392: 18392] Allocate a new trap: 0xc007b08e40 42 D0323 21:16:50.593528 249972 usertrap_amd64.go:225] [ 18392: 18392] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.593925 249972 task_exit.go:204] [ 18392: 18392] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.593956 249972 task_exit.go:204] [ 18392: 18392] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.594040 249972 task_signals.go:204] [ 18392: 18393] Signal 18392, PID: 18393, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.594078 249972 task_exit.go:204] [ 18392: 18393] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.597505 249972 task_exit.go:204] [ 18392: 18393] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.597540 249972 task_exit.go:204] [ 18392: 18393] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.597553 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.597759 249972 task_exit.go:204] [ 18392: 18392] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) D0323 21:16:50.599756 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.599957 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.611918 249972 usertrap_amd64.go:212] [ 18394: 18394] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.611947 249972 usertrap_amd64.go:122] [ 18394: 18394] Allocate a new trap: 0xc00307fc50 39 D0323 21:16:50.612020 249972 usertrap_amd64.go:225] [ 18394: 18394] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.615722 249972 usertrap_amd64.go:212] [ 18394: 18394] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.615753 249972 usertrap_amd64.go:122] [ 18394: 18394] Allocate a new trap: 0xc00307fc50 40 D0323 21:16:50.615766 249972 usertrap_amd64.go:225] [ 18394: 18394] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.617094 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.617357 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.620833 249972 usertrap_amd64.go:212] [ 18394: 18394] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.620860 249972 usertrap_amd64.go:122] [ 18394: 18394] Allocate a new trap: 0xc00307fc50 41 D0323 21:16:50.620871 249972 usertrap_amd64.go:225] [ 18394: 18394] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.629347 249972 usertrap_amd64.go:212] [ 18394: 18394] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.629418 249972 usertrap_amd64.go:122] [ 18394: 18394] Allocate a new trap: 0xc00307fc50 42 D0323 21:16:50.629465 249972 usertrap_amd64.go:225] [ 18394: 18394] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.632749 249972 task_exit.go:204] [ 18394: 18394] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.632782 249972 task_exit.go:204] [ 18394: 18394] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.632840 249972 task_signals.go:204] [ 18394: 18395] Signal 18394, PID: 18395, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.632857 249972 task_exit.go:204] [ 18394: 18395] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.634825 249972 task_exit.go:204] [ 18394: 18395] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.634839 249972 task_exit.go:204] [ 18394: 18395] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.634850 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.635965 249972 task_exit.go:204] [ 18394: 18394] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) D0323 21:16:50.641745 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.642428 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.654545 249972 usertrap_amd64.go:212] [ 18396: 18396] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.654568 249972 usertrap_amd64.go:122] [ 18396: 18396] Allocate a new trap: 0xc0038be870 39 D0323 21:16:50.655373 249972 usertrap_amd64.go:225] [ 18396: 18396] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.657475 249972 usertrap_amd64.go:212] [ 18396: 18396] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.657502 249972 usertrap_amd64.go:122] [ 18396: 18396] Allocate a new trap: 0xc0038be870 40 D0323 21:16:50.657514 249972 usertrap_amd64.go:225] [ 18396: 18396] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.658027 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.658232 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.663153 249972 usertrap_amd64.go:212] [ 18396: 18396] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.663200 249972 usertrap_amd64.go:122] [ 18396: 18396] Allocate a new trap: 0xc0038be870 41 D0323 21:16:50.663219 249972 usertrap_amd64.go:225] [ 18396: 18396] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.677164 249972 usertrap_amd64.go:212] [ 18396: 18396] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.677195 249972 usertrap_amd64.go:122] [ 18396: 18396] Allocate a new trap: 0xc0038be870 42 D0323 21:16:50.677206 249972 usertrap_amd64.go:225] [ 18396: 18396] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.677970 249972 task_exit.go:204] [ 18396: 18396] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.678038 249972 task_exit.go:204] [ 18396: 18396] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.678079 249972 task_signals.go:204] [ 18396: 18397] Signal 18396, PID: 18397, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.678117 249972 task_exit.go:204] [ 18396: 18397] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.681959 249972 task_exit.go:204] [ 18396: 18397] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.682016 249972 task_exit.go:204] [ 18396: 18397] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.682036 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.682717 249972 task_exit.go:204] [ 18396: 18396] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.684187 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.684412 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x6, 0x18, 0x0, &(0x7f0000000040)) D0323 21:16:50.693522 249972 usertrap_amd64.go:212] [ 18398: 18398] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.693553 249972 usertrap_amd64.go:122] [ 18398: 18398] Allocate a new trap: 0xc0038bea20 39 D0323 21:16:50.693659 249972 usertrap_amd64.go:225] [ 18398: 18398] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.694767 249972 usertrap_amd64.go:212] [ 18398: 18398] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.694796 249972 usertrap_amd64.go:122] [ 18398: 18398] Allocate a new trap: 0xc0038bea20 40 D0323 21:16:50.694807 249972 usertrap_amd64.go:225] [ 18398: 18398] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.698756 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.699029 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.704344 249972 usertrap_amd64.go:212] [ 18398: 18398] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.704378 249972 usertrap_amd64.go:122] [ 18398: 18398] Allocate a new trap: 0xc0038bea20 41 D0323 21:16:50.704396 249972 usertrap_amd64.go:225] [ 18398: 18398] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.713817 249972 usertrap_amd64.go:212] [ 18398: 18398] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.713852 249972 usertrap_amd64.go:122] [ 18398: 18398] Allocate a new trap: 0xc0038bea20 42 D0323 21:16:50.713866 249972 usertrap_amd64.go:225] [ 18398: 18398] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.714304 249972 task_exit.go:204] [ 18398: 18398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.714347 249972 task_exit.go:204] [ 18398: 18398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.714532 249972 task_signals.go:204] [ 18398: 18399] Signal 18398, PID: 18399, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.714580 249972 task_exit.go:204] [ 18398: 18399] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.716999 249972 task_exit.go:204] [ 18398: 18399] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.717034 249972 task_exit.go:204] [ 18398: 18399] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.717046 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.717076 249972 task_exit.go:204] [ 18398: 18398] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x6, 0x1b, 0x0, &(0x7f0000000040)) D0323 21:16:50.722143 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.722279 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.734816 249972 usertrap_amd64.go:212] [ 18400: 18400] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.734836 249972 usertrap_amd64.go:122] [ 18400: 18400] Allocate a new trap: 0xc0046391d0 39 D0323 21:16:50.734948 249972 usertrap_amd64.go:225] [ 18400: 18400] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.736347 249972 usertrap_amd64.go:212] [ 18400: 18400] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.736386 249972 usertrap_amd64.go:122] [ 18400: 18400] Allocate a new trap: 0xc0046391d0 40 D0323 21:16:50.736401 249972 usertrap_amd64.go:225] [ 18400: 18400] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.737276 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.737520 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.742816 249972 usertrap_amd64.go:212] [ 18400: 18400] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.742850 249972 usertrap_amd64.go:122] [ 18400: 18400] Allocate a new trap: 0xc0046391d0 41 D0323 21:16:50.742864 249972 usertrap_amd64.go:225] [ 18400: 18400] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.752016 249972 usertrap_amd64.go:212] [ 18400: 18400] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.752045 249972 usertrap_amd64.go:122] [ 18400: 18400] Allocate a new trap: 0xc0046391d0 42 D0323 21:16:50.752059 249972 usertrap_amd64.go:225] [ 18400: 18400] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.752506 249972 task_exit.go:204] [ 18400: 18400] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.752536 249972 task_exit.go:204] [ 18400: 18400] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.752663 249972 task_signals.go:204] [ 18400: 18401] Signal 18400, PID: 18401, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.752699 249972 task_exit.go:204] [ 18400: 18401] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.754550 249972 task_exit.go:204] [ 18400: 18401] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.754596 249972 task_exit.go:204] [ 18400: 18401] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.754613 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.755246 249972 task_exit.go:204] [ 18400: 18400] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)) D0323 21:16:50.760927 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.761128 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.769690 249972 usertrap_amd64.go:212] [ 18402: 18402] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.769763 249972 usertrap_amd64.go:122] [ 18402: 18402] Allocate a new trap: 0xc004639290 39 D0323 21:16:50.769826 249972 usertrap_amd64.go:225] [ 18402: 18402] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.770737 249972 usertrap_amd64.go:212] [ 18402: 18402] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.770758 249972 usertrap_amd64.go:122] [ 18402: 18402] Allocate a new trap: 0xc004639290 40 D0323 21:16:50.770767 249972 usertrap_amd64.go:225] [ 18402: 18402] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.771236 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.771414 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.774410 249972 usertrap_amd64.go:212] [ 18402: 18402] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.774434 249972 usertrap_amd64.go:122] [ 18402: 18402] Allocate a new trap: 0xc004639290 41 D0323 21:16:50.774444 249972 usertrap_amd64.go:225] [ 18402: 18402] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.780557 249972 usertrap_amd64.go:212] [ 18402: 18402] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.780584 249972 usertrap_amd64.go:122] [ 18402: 18402] Allocate a new trap: 0xc004639290 42 D0323 21:16:50.780598 249972 usertrap_amd64.go:225] [ 18402: 18402] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.780815 249972 task_exit.go:204] [ 18402: 18402] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.780847 249972 task_exit.go:204] [ 18402: 18402] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.780917 249972 task_signals.go:204] [ 18402: 18403] Signal 18402, PID: 18403, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.780981 249972 task_exit.go:204] [ 18402: 18403] Transitioning from exit state TaskExitNone to TaskExitInitiated 21:16:50 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/dmi', 0x0, 0x0) D0323 21:16:50.782573 249972 task_exit.go:204] [ 18402: 18403] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.782586 249972 task_exit.go:204] [ 18402: 18403] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.782596 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.783632 249972 task_exit.go:204] [ 18402: 18402] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.785878 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.786076 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.799413 249972 usertrap_amd64.go:212] [ 18404: 18404] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.799442 249972 usertrap_amd64.go:122] [ 18404: 18404] Allocate a new trap: 0xc000947ce0 39 D0323 21:16:50.799522 249972 usertrap_amd64.go:225] [ 18404: 18404] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.800234 249972 usertrap_amd64.go:212] [ 18404: 18404] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.800258 249972 usertrap_amd64.go:122] [ 18404: 18404] Allocate a new trap: 0xc000947ce0 40 D0323 21:16:50.800268 249972 usertrap_amd64.go:225] [ 18404: 18404] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.800645 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.800828 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.803647 249972 usertrap_amd64.go:212] [ 18404: 18404] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.803720 249972 usertrap_amd64.go:122] [ 18404: 18404] Allocate a new trap: 0xc000947ce0 41 D0323 21:16:50.803735 249972 usertrap_amd64.go:225] [ 18404: 18404] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.809232 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, sys]} D0323 21:16:50.809661 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.810314 249972 usertrap_amd64.go:212] [ 18404: 18404] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.810344 249972 usertrap_amd64.go:122] [ 18404: 18404] Allocate a new trap: 0xc000947ce0 42 D0323 21:16:50.810358 249972 usertrap_amd64.go:225] [ 18404: 18404] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.810684 249972 task_exit.go:204] [ 18404: 18404] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.810721 249972 task_exit.go:204] [ 18404: 18404] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.810804 249972 task_signals.go:204] [ 18404: 18405] Signal 18404, PID: 18405, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.810832 249972 task_exit.go:204] [ 18404: 18405] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.812553 249972 task_exit.go:204] [ 18404: 18405] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.812585 249972 task_exit.go:204] [ 18404: 18405] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.812596 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.814155 249972 task_exit.go:204] [ 18404: 18404] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000080)=0x7aceb47c, 0x4) D0323 21:16:50.817292 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.817450 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.826622 249972 usertrap_amd64.go:212] [ 18406: 18406] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.826650 249972 usertrap_amd64.go:122] [ 18406: 18406] Allocate a new trap: 0xc000947e30 39 D0323 21:16:50.826753 249972 usertrap_amd64.go:225] [ 18406: 18406] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.827375 249972 usertrap_amd64.go:212] [ 18406: 18406] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.827401 249972 usertrap_amd64.go:122] [ 18406: 18406] Allocate a new trap: 0xc000947e30 40 D0323 21:16:50.827413 249972 usertrap_amd64.go:225] [ 18406: 18406] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.827772 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.828211 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.831085 249972 usertrap_amd64.go:212] [ 18406: 18406] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.831111 249972 usertrap_amd64.go:122] [ 18406: 18406] Allocate a new trap: 0xc000947e30 41 D0323 21:16:50.831123 249972 usertrap_amd64.go:225] [ 18406: 18406] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.843593 249972 usertrap_amd64.go:212] [ 18406: 18406] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.843624 249972 usertrap_amd64.go:122] [ 18406: 18406] Allocate a new trap: 0xc000947e30 42 D0323 21:16:50.843664 249972 usertrap_amd64.go:225] [ 18406: 18406] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.844017 249972 task_exit.go:204] [ 18406: 18406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.844091 249972 task_exit.go:204] [ 18406: 18406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.844177 249972 task_signals.go:204] [ 18406: 18407] Signal 18406, PID: 18407, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.844203 249972 task_exit.go:204] [ 18406: 18407] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.846617 249972 task_exit.go:204] [ 18406: 18407] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.846645 249972 task_exit.go:204] [ 18406: 18407] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.846660 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.847788 249972 task_exit.go:204] [ 18406: 18406] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x42882, 0x0) write$cgroup_type(r0, &(0x7f0000000380), 0x9) D0323 21:16:50.848875 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.849044 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.858482 249972 usertrap_amd64.go:212] [ 18408: 18408] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.858530 249972 usertrap_amd64.go:122] [ 18408: 18408] Allocate a new trap: 0xc00aa86a50 39 D0323 21:16:50.858583 249972 usertrap_amd64.go:225] [ 18408: 18408] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.859009 249972 usertrap_amd64.go:212] [ 18408: 18408] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.859032 249972 usertrap_amd64.go:122] [ 18408: 18408] Allocate a new trap: 0xc00aa86a50 40 D0323 21:16:50.859042 249972 usertrap_amd64.go:225] [ 18408: 18408] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.859635 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.859814 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.862913 249972 usertrap_amd64.go:212] [ 18408: 18408] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.862941 249972 usertrap_amd64.go:122] [ 18408: 18408] Allocate a new trap: 0xc00aa86a50 41 D0323 21:16:50.862953 249972 usertrap_amd64.go:225] [ 18408: 18408] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.868826 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.869013 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.870766 249972 usertrap_amd64.go:212] [ 18408: 18408] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.870945 249972 usertrap_amd64.go:122] [ 18408: 18408] Allocate a new trap: 0xc00aa86a50 42 D0323 21:16:50.870976 249972 usertrap_amd64.go:225] [ 18408: 18408] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.871279 249972 task_exit.go:204] [ 18408: 18408] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.871310 249972 task_exit.go:204] [ 18408: 18408] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.871311 249972 task_signals.go:204] [ 18408: 18409] Signal 18408, PID: 18409, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.871329 249972 task_exit.go:204] [ 18408: 18409] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.873511 249972 task_exit.go:204] [ 18408: 18409] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.873533 249972 task_exit.go:204] [ 18408: 18409] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.873543 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.873721 249972 task_exit.go:204] [ 18408: 18408] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0x17, 0x0, 0x0) D0323 21:16:50.876076 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.876226 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.895497 249972 usertrap_amd64.go:212] [ 18410: 18410] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.895525 249972 usertrap_amd64.go:122] [ 18410: 18410] Allocate a new trap: 0xc007b09470 39 D0323 21:16:50.895595 249972 usertrap_amd64.go:225] [ 18410: 18410] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.896136 249972 usertrap_amd64.go:212] [ 18410: 18410] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.896157 249972 usertrap_amd64.go:122] [ 18410: 18410] Allocate a new trap: 0xc007b09470 40 D0323 21:16:50.896166 249972 usertrap_amd64.go:225] [ 18410: 18410] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.896646 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.896902 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.902480 249972 usertrap_amd64.go:212] [ 18410: 18410] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.902506 249972 usertrap_amd64.go:122] [ 18410: 18410] Allocate a new trap: 0xc007b09470 41 D0323 21:16:50.902517 249972 usertrap_amd64.go:225] [ 18410: 18410] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.910856 249972 usertrap_amd64.go:212] [ 18410: 18410] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.910920 249972 usertrap_amd64.go:122] [ 18410: 18410] Allocate a new trap: 0xc007b09470 42 D0323 21:16:50.910953 249972 usertrap_amd64.go:225] [ 18410: 18410] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.911395 249972 task_exit.go:204] [ 18410: 18410] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.911459 249972 task_exit.go:204] [ 18410: 18410] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.911655 249972 task_signals.go:204] [ 18410: 18411] Signal 18410, PID: 18411, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.911682 249972 task_exit.go:204] [ 18410: 18411] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.913321 249972 task_exit.go:204] [ 18410: 18411] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.913344 249972 task_exit.go:204] [ 18410: 18411] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.913354 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 21:16:50 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0x12, 0x0, 0x0) D0323 21:16:50.915123 249972 task_exit.go:204] [ 18410: 18410] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.916385 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.916531 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.926689 249972 usertrap_amd64.go:212] [ 18412: 18412] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.926720 249972 usertrap_amd64.go:122] [ 18412: 18412] Allocate a new trap: 0xc0038beb10 39 D0323 21:16:50.926812 249972 usertrap_amd64.go:225] [ 18412: 18412] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.927548 249972 usertrap_amd64.go:212] [ 18412: 18412] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.927629 249972 usertrap_amd64.go:122] [ 18412: 18412] Allocate a new trap: 0xc0038beb10 40 D0323 21:16:50.927647 249972 usertrap_amd64.go:225] [ 18412: 18412] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.928149 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.928404 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.932285 249972 usertrap_amd64.go:212] [ 18412: 18412] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.932316 249972 usertrap_amd64.go:122] [ 18412: 18412] Allocate a new trap: 0xc0038beb10 41 D0323 21:16:50.932333 249972 usertrap_amd64.go:225] [ 18412: 18412] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.943014 249972 usertrap_amd64.go:212] [ 18412: 18412] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.943052 249972 usertrap_amd64.go:122] [ 18412: 18412] Allocate a new trap: 0xc0038beb10 42 D0323 21:16:50.943070 249972 usertrap_amd64.go:225] [ 18412: 18412] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.943586 249972 task_exit.go:204] [ 18412: 18412] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.943695 249972 task_exit.go:204] [ 18412: 18412] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.943851 249972 task_signals.go:204] [ 18412: 18413] Signal 18412, PID: 18413, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.943883 249972 task_exit.go:204] [ 18412: 18413] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.945814 249972 task_exit.go:204] [ 18412: 18413] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.945843 249972 task_exit.go:204] [ 18412: 18413] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.945858 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:50.946886 249972 task_exit.go:204] [ 18412: 18412] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:50 executing program 0: r0 = socket(0x2, 0x3, 0x9) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) D0323 21:16:50.948123 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.948269 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.959573 249972 usertrap_amd64.go:212] [ 18414: 18414] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:50.959605 249972 usertrap_amd64.go:122] [ 18414: 18414] Allocate a new trap: 0xc007b09710 39 D0323 21:16:50.959749 249972 usertrap_amd64.go:225] [ 18414: 18414] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:50.960409 249972 usertrap_amd64.go:212] [ 18414: 18414] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:50.960427 249972 usertrap_amd64.go:122] [ 18414: 18414] Allocate a new trap: 0xc007b09710 40 D0323 21:16:50.960465 249972 usertrap_amd64.go:225] [ 18414: 18414] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:50.961531 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:50.961742 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:50.965134 249972 usertrap_amd64.go:212] [ 18414: 18414] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:50.965161 249972 usertrap_amd64.go:122] [ 18414: 18414] Allocate a new trap: 0xc007b09710 41 D0323 21:16:50.965172 249972 usertrap_amd64.go:225] [ 18414: 18414] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:50.974805 249972 usertrap_amd64.go:212] [ 18414: 18414] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:50.974834 249972 usertrap_amd64.go:122] [ 18414: 18414] Allocate a new trap: 0xc007b09710 42 D0323 21:16:50.974846 249972 usertrap_amd64.go:225] [ 18414: 18414] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:50.975184 249972 task_exit.go:204] [ 18414: 18414] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.975217 249972 task_exit.go:204] [ 18414: 18414] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.975433 249972 task_signals.go:204] [ 18414: 18415] Signal 18414, PID: 18415, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:50.975465 249972 task_exit.go:204] [ 18414: 18415] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:50.978276 249972 task_exit.go:204] [ 18414: 18415] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:50.978303 249972 task_exit.go:204] [ 18414: 18415] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.978354 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 21:16:50 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') D0323 21:16:50.979139 249972 task_exit.go:204] [ 18414: 18414] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:50.994728 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:50.994928 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.002408 249972 usertrap_amd64.go:212] [ 18416: 18416] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.002442 249972 usertrap_amd64.go:122] [ 18416: 18416] Allocate a new trap: 0xc0038bebd0 39 D0323 21:16:51.002508 249972 usertrap_amd64.go:225] [ 18416: 18416] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.002909 249972 usertrap_amd64.go:212] [ 18416: 18416] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.002943 249972 usertrap_amd64.go:122] [ 18416: 18416] Allocate a new trap: 0xc0038bebd0 40 D0323 21:16:51.002966 249972 usertrap_amd64.go:225] [ 18416: 18416] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.003316 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.003472 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.007705 249972 usertrap_amd64.go:212] [ 18416: 18416] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.007738 249972 usertrap_amd64.go:122] [ 18416: 18416] Allocate a new trap: 0xc0038bebd0 41 D0323 21:16:51.007749 249972 usertrap_amd64.go:225] [ 18416: 18416] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.014934 249972 usertrap_amd64.go:212] [ 18416: 18417] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:51.015017 249972 usertrap_amd64.go:122] [ 18416: 18417] Allocate a new trap: 0xc0038bebd0 42 D0323 21:16:51.015039 249972 usertrap_amd64.go:225] [ 18416: 18417] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.015760 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.016065 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.017559 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.017729 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.018501 249972 usertrap_amd64.go:212] [ 18416: 18416] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.018534 249972 usertrap_amd64.go:122] [ 18416: 18416] Allocate a new trap: 0xc0038bebd0 43 D0323 21:16:51.018544 249972 usertrap_amd64.go:225] [ 18416: 18416] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:51.018931 249972 task_exit.go:204] [ 18416: 18416] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.018998 249972 task_exit.go:204] [ 18416: 18416] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.019089 249972 task_signals.go:204] [ 18416: 18417] Signal 18416, PID: 18417, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.019118 249972 task_exit.go:204] [ 18416: 18417] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.022044 249972 task_exit.go:204] [ 18416: 18417] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.022084 249972 task_exit.go:204] [ 18416: 18417] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.022095 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.024160 249972 task_exit.go:204] [ 18416: 18416] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x12, &(0x7f0000000000), 0x4) D0323 21:16:51.025497 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.025613 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.038548 249972 usertrap_amd64.go:212] [ 18418: 18418] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.038606 249972 usertrap_amd64.go:122] [ 18418: 18418] Allocate a new trap: 0xc0065ae930 39 D0323 21:16:51.038688 249972 usertrap_amd64.go:225] [ 18418: 18418] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.039188 249972 usertrap_amd64.go:212] [ 18418: 18418] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.039212 249972 usertrap_amd64.go:122] [ 18418: 18418] Allocate a new trap: 0xc0065ae930 40 D0323 21:16:51.039223 249972 usertrap_amd64.go:225] [ 18418: 18418] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.041193 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.041426 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.043795 249972 usertrap_amd64.go:212] [ 18418: 18418] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.043856 249972 usertrap_amd64.go:122] [ 18418: 18418] Allocate a new trap: 0xc0065ae930 41 D0323 21:16:51.043889 249972 usertrap_amd64.go:225] [ 18418: 18418] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.057841 249972 usertrap_amd64.go:212] [ 18418: 18418] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.057881 249972 usertrap_amd64.go:122] [ 18418: 18418] Allocate a new trap: 0xc0065ae930 42 D0323 21:16:51.057896 249972 usertrap_amd64.go:225] [ 18418: 18418] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.062169 249972 task_exit.go:204] [ 18418: 18418] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.062213 249972 task_exit.go:204] [ 18418: 18418] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.063185 249972 task_signals.go:204] [ 18418: 18419] Signal 18418, PID: 18419, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.063263 249972 task_exit.go:204] [ 18418: 18419] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.064469 249972 task_exit.go:204] [ 18418: 18419] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.064498 249972 task_exit.go:204] [ 18418: 18419] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.064512 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.071556 249972 task_exit.go:204] [ 18418: 18418] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x2a, 0x0, 0x0) D0323 21:16:51.074027 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.074214 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.085592 249972 usertrap_amd64.go:212] [ 18420: 18420] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.085622 249972 usertrap_amd64.go:122] [ 18420: 18420] Allocate a new trap: 0xc00aa86e10 39 D0323 21:16:51.085715 249972 usertrap_amd64.go:225] [ 18420: 18420] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.086337 249972 usertrap_amd64.go:212] [ 18420: 18420] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.086421 249972 usertrap_amd64.go:122] [ 18420: 18420] Allocate a new trap: 0xc00aa86e10 40 D0323 21:16:51.086448 249972 usertrap_amd64.go:225] [ 18420: 18420] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.087062 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.087333 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.094271 249972 usertrap_amd64.go:212] [ 18420: 18420] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.094314 249972 usertrap_amd64.go:122] [ 18420: 18420] Allocate a new trap: 0xc00aa86e10 41 D0323 21:16:51.094327 249972 usertrap_amd64.go:225] [ 18420: 18420] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.106063 249972 usertrap_amd64.go:212] [ 18420: 18420] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.106092 249972 usertrap_amd64.go:122] [ 18420: 18420] Allocate a new trap: 0xc00aa86e10 42 D0323 21:16:51.106106 249972 usertrap_amd64.go:225] [ 18420: 18420] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.106533 249972 task_exit.go:204] [ 18420: 18420] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.106591 249972 task_exit.go:204] [ 18420: 18420] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.106654 249972 task_signals.go:204] [ 18420: 18421] Signal 18420, PID: 18421, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.106685 249972 task_exit.go:204] [ 18420: 18421] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.108621 249972 task_exit.go:204] [ 18420: 18421] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.108660 249972 task_exit.go:204] [ 18420: 18421] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.108675 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.109955 249972 task_exit.go:204] [ 18420: 18420] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x15, &(0x7f0000000000), 0x4) D0323 21:16:51.112464 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.112616 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.127869 249972 usertrap_amd64.go:212] [ 18422: 18422] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.127901 249972 usertrap_amd64.go:122] [ 18422: 18422] Allocate a new trap: 0xc00aa86e70 39 D0323 21:16:51.128057 249972 usertrap_amd64.go:225] [ 18422: 18422] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.129583 249972 usertrap_amd64.go:212] [ 18422: 18422] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.129602 249972 usertrap_amd64.go:122] [ 18422: 18422] Allocate a new trap: 0xc00aa86e70 40 D0323 21:16:51.129612 249972 usertrap_amd64.go:225] [ 18422: 18422] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.130944 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.131171 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.135676 249972 usertrap_amd64.go:212] [ 18422: 18422] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.135703 249972 usertrap_amd64.go:122] [ 18422: 18422] Allocate a new trap: 0xc00aa86e70 41 D0323 21:16:51.135716 249972 usertrap_amd64.go:225] [ 18422: 18422] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.146774 249972 usertrap_amd64.go:212] [ 18422: 18422] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.146892 249972 usertrap_amd64.go:122] [ 18422: 18422] Allocate a new trap: 0xc00aa86e70 42 D0323 21:16:51.146922 249972 usertrap_amd64.go:225] [ 18422: 18422] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.148868 249972 task_exit.go:204] [ 18422: 18422] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.148914 249972 task_exit.go:204] [ 18422: 18422] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.149503 249972 task_signals.go:204] [ 18422: 18423] Signal 18422, PID: 18423, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.149529 249972 task_exit.go:204] [ 18422: 18423] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.152406 249972 task_exit.go:204] [ 18422: 18423] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.152504 249972 task_exit.go:204] [ 18422: 18423] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.152522 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.154535 249972 task_exit.go:204] [ 18422: 18422] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.157559 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.157724 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:51 executing program 0: semop(0x0, &(0x7f0000000000)=[{}], 0x2aaaaaaaaaaaab28) D0323 21:16:51.169935 249972 usertrap_amd64.go:212] [ 18424: 18424] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.169967 249972 usertrap_amd64.go:122] [ 18424: 18424] Allocate a new trap: 0xc0065aeae0 39 D0323 21:16:51.170070 249972 usertrap_amd64.go:225] [ 18424: 18424] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.170880 249972 usertrap_amd64.go:212] [ 18424: 18424] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.171012 249972 usertrap_amd64.go:122] [ 18424: 18424] Allocate a new trap: 0xc0065aeae0 40 D0323 21:16:51.171041 249972 usertrap_amd64.go:225] [ 18424: 18424] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.171808 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.171987 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.177444 249972 usertrap_amd64.go:212] [ 18424: 18424] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.177470 249972 usertrap_amd64.go:122] [ 18424: 18424] Allocate a new trap: 0xc0065aeae0 41 D0323 21:16:51.177484 249972 usertrap_amd64.go:225] [ 18424: 18424] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.187457 249972 usertrap_amd64.go:212] [ 18424: 18424] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.187504 249972 usertrap_amd64.go:122] [ 18424: 18424] Allocate a new trap: 0xc0065aeae0 42 D0323 21:16:51.187520 249972 usertrap_amd64.go:225] [ 18424: 18424] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.189323 249972 task_exit.go:204] [ 18424: 18424] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.189355 249972 task_exit.go:204] [ 18424: 18424] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.189490 249972 task_signals.go:204] [ 18424: 18425] Signal 18424, PID: 18425, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.189532 249972 task_exit.go:204] [ 18424: 18425] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.191334 249972 task_exit.go:204] [ 18424: 18425] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.191408 249972 task_exit.go:204] [ 18424: 18425] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.191458 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.192801 249972 task_exit.go:204] [ 18424: 18424] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x3ff, 0x4) D0323 21:16:51.213192 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.214114 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.228339 249972 usertrap_amd64.go:212] [ 18426: 18426] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.228380 249972 usertrap_amd64.go:122] [ 18426: 18426] Allocate a new trap: 0xc0065aebd0 39 D0323 21:16:51.228495 249972 usertrap_amd64.go:225] [ 18426: 18426] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.229494 249972 usertrap_amd64.go:212] [ 18426: 18426] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.229519 249972 usertrap_amd64.go:122] [ 18426: 18426] Allocate a new trap: 0xc0065aebd0 40 D0323 21:16:51.229530 249972 usertrap_amd64.go:225] [ 18426: 18426] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.230080 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.230452 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.234156 249972 usertrap_amd64.go:212] [ 18426: 18426] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.234182 249972 usertrap_amd64.go:122] [ 18426: 18426] Allocate a new trap: 0xc0065aebd0 41 D0323 21:16:51.234194 249972 usertrap_amd64.go:225] [ 18426: 18426] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.240904 249972 usertrap_amd64.go:212] [ 18426: 18426] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.240932 249972 usertrap_amd64.go:122] [ 18426: 18426] Allocate a new trap: 0xc0065aebd0 42 D0323 21:16:51.240966 249972 usertrap_amd64.go:225] [ 18426: 18426] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.241287 249972 task_exit.go:204] [ 18426: 18426] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.241325 249972 task_exit.go:204] [ 18426: 18426] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.241390 249972 task_signals.go:204] [ 18426: 18427] Signal 18426, PID: 18427, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.241422 249972 task_exit.go:204] [ 18426: 18427] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.243611 249972 task_exit.go:204] [ 18426: 18427] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.243659 249972 task_exit.go:204] [ 18426: 18427] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.243703 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.244622 249972 task_exit.go:204] [ 18426: 18426] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000500)) D0323 21:16:51.246014 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.246212 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.259890 249972 usertrap_amd64.go:212] [ 18428: 18428] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.259972 249972 usertrap_amd64.go:122] [ 18428: 18428] Allocate a new trap: 0xc0065aec30 39 D0323 21:16:51.260082 249972 usertrap_amd64.go:225] [ 18428: 18428] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.261256 249972 usertrap_amd64.go:212] [ 18428: 18428] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.261336 249972 usertrap_amd64.go:122] [ 18428: 18428] Allocate a new trap: 0xc0065aec30 40 D0323 21:16:51.261391 249972 usertrap_amd64.go:225] [ 18428: 18428] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.263516 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.263737 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.272455 249972 usertrap_amd64.go:212] [ 18428: 18428] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.272489 249972 usertrap_amd64.go:122] [ 18428: 18428] Allocate a new trap: 0xc0065aec30 41 D0323 21:16:51.272502 249972 usertrap_amd64.go:225] [ 18428: 18428] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.280867 249972 usertrap_amd64.go:212] [ 18428: 18428] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.280905 249972 usertrap_amd64.go:122] [ 18428: 18428] Allocate a new trap: 0xc0065aec30 42 D0323 21:16:51.280920 249972 usertrap_amd64.go:225] [ 18428: 18428] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.281657 249972 task_exit.go:204] [ 18428: 18428] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.281694 249972 task_exit.go:204] [ 18428: 18428] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.281732 249972 task_signals.go:204] [ 18428: 18429] Signal 18428, PID: 18429, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.281754 249972 task_exit.go:204] [ 18428: 18429] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.285714 249972 task_exit.go:204] [ 18428: 18429] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.285820 249972 task_exit.go:204] [ 18428: 18429] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.285859 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.285905 249972 task_exit.go:204] [ 18428: 18428] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.288178 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.288322 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:51 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0x11, 0x0, 0x0) D0323 21:16:51.300104 249972 usertrap_amd64.go:212] [ 18430: 18430] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.300130 249972 usertrap_amd64.go:122] [ 18430: 18430] Allocate a new trap: 0xc00307fda0 39 D0323 21:16:51.300317 249972 usertrap_amd64.go:225] [ 18430: 18430] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.301703 249972 usertrap_amd64.go:212] [ 18430: 18430] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.301742 249972 usertrap_amd64.go:122] [ 18430: 18430] Allocate a new trap: 0xc00307fda0 40 D0323 21:16:51.301759 249972 usertrap_amd64.go:225] [ 18430: 18430] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.302475 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.302704 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.306473 249972 usertrap_amd64.go:212] [ 18430: 18430] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.306504 249972 usertrap_amd64.go:122] [ 18430: 18430] Allocate a new trap: 0xc00307fda0 41 D0323 21:16:51.306517 249972 usertrap_amd64.go:225] [ 18430: 18430] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.313786 249972 usertrap_amd64.go:212] [ 18430: 18430] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.313856 249972 usertrap_amd64.go:122] [ 18430: 18430] Allocate a new trap: 0xc00307fda0 42 D0323 21:16:51.313872 249972 usertrap_amd64.go:225] [ 18430: 18430] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.314985 249972 task_exit.go:204] [ 18430: 18430] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.315026 249972 task_exit.go:204] [ 18430: 18430] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.315111 249972 task_signals.go:204] [ 18430: 18431] Signal 18430, PID: 18431, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.315146 249972 task_exit.go:204] [ 18430: 18431] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.316525 249972 task_exit.go:204] [ 18430: 18431] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.316550 249972 task_exit.go:204] [ 18430: 18431] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.316563 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.318016 249972 task_exit.go:204] [ 18430: 18430] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x14) D0323 21:16:51.319712 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.319920 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.328617 249972 usertrap_amd64.go:212] [ 18432: 18432] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.328691 249972 usertrap_amd64.go:122] [ 18432: 18432] Allocate a new trap: 0xc00aa87080 39 D0323 21:16:51.328828 249972 usertrap_amd64.go:225] [ 18432: 18432] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.329636 249972 usertrap_amd64.go:212] [ 18432: 18432] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.329698 249972 usertrap_amd64.go:122] [ 18432: 18432] Allocate a new trap: 0xc00aa87080 40 D0323 21:16:51.329750 249972 usertrap_amd64.go:225] [ 18432: 18432] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.331082 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.331268 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.334848 249972 usertrap_amd64.go:212] [ 18432: 18432] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.334872 249972 usertrap_amd64.go:122] [ 18432: 18432] Allocate a new trap: 0xc00aa87080 41 D0323 21:16:51.334884 249972 usertrap_amd64.go:225] [ 18432: 18432] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.345634 249972 usertrap_amd64.go:212] [ 18432: 18432] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.345663 249972 usertrap_amd64.go:122] [ 18432: 18432] Allocate a new trap: 0xc00aa87080 42 D0323 21:16:51.345678 249972 usertrap_amd64.go:225] [ 18432: 18432] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.346006 249972 task_exit.go:204] [ 18432: 18432] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.346033 249972 task_exit.go:204] [ 18432: 18432] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.346124 249972 task_signals.go:204] [ 18432: 18433] Signal 18432, PID: 18433, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.346169 249972 task_exit.go:204] [ 18432: 18433] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.349914 249972 task_exit.go:204] [ 18432: 18433] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.350020 249972 task_exit.go:204] [ 18432: 18433] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.350042 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.350640 249972 task_exit.go:204] [ 18432: 18432] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4c, &(0x7f0000000000), 0x4) D0323 21:16:51.354442 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.354637 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.364887 249972 usertrap_amd64.go:212] [ 18434: 18434] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.364922 249972 usertrap_amd64.go:122] [ 18434: 18434] Allocate a new trap: 0xc0046394d0 39 D0323 21:16:51.365108 249972 usertrap_amd64.go:225] [ 18434: 18434] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.365874 249972 usertrap_amd64.go:212] [ 18434: 18434] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.365949 249972 usertrap_amd64.go:122] [ 18434: 18434] Allocate a new trap: 0xc0046394d0 40 D0323 21:16:51.366030 249972 usertrap_amd64.go:225] [ 18434: 18434] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.366641 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.367044 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.370576 249972 usertrap_amd64.go:212] [ 18434: 18434] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.370599 249972 usertrap_amd64.go:122] [ 18434: 18434] Allocate a new trap: 0xc0046394d0 41 D0323 21:16:51.370613 249972 usertrap_amd64.go:225] [ 18434: 18434] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.380295 249972 usertrap_amd64.go:212] [ 18434: 18434] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.380333 249972 usertrap_amd64.go:122] [ 18434: 18434] Allocate a new trap: 0xc0046394d0 42 D0323 21:16:51.380347 249972 usertrap_amd64.go:225] [ 18434: 18434] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.380842 249972 task_exit.go:204] [ 18434: 18434] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.380888 249972 task_exit.go:204] [ 18434: 18434] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.380912 249972 task_signals.go:204] [ 18434: 18435] Signal 18434, PID: 18435, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.380985 249972 task_exit.go:204] [ 18434: 18435] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.382571 249972 task_exit.go:204] [ 18434: 18435] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.382595 249972 task_exit.go:204] [ 18434: 18435] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.382609 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.383918 249972 task_exit.go:204] [ 18434: 18434] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0x8, 0x0, 0x0) D0323 21:16:51.385561 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.385694 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.403634 249972 usertrap_amd64.go:212] [ 18436: 18436] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.403715 249972 usertrap_amd64.go:122] [ 18436: 18436] Allocate a new trap: 0xc0065af050 39 D0323 21:16:51.403879 249972 usertrap_amd64.go:225] [ 18436: 18436] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.405035 249972 usertrap_amd64.go:212] [ 18436: 18436] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.405072 249972 usertrap_amd64.go:122] [ 18436: 18436] Allocate a new trap: 0xc0065af050 40 D0323 21:16:51.405084 249972 usertrap_amd64.go:225] [ 18436: 18436] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.405904 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.406099 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.408844 249972 usertrap_amd64.go:212] [ 18436: 18436] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.408860 249972 usertrap_amd64.go:122] [ 18436: 18436] Allocate a new trap: 0xc0065af050 41 D0323 21:16:51.408871 249972 usertrap_amd64.go:225] [ 18436: 18436] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.418879 249972 usertrap_amd64.go:212] [ 18436: 18436] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.418909 249972 usertrap_amd64.go:122] [ 18436: 18436] Allocate a new trap: 0xc0065af050 42 D0323 21:16:51.418918 249972 usertrap_amd64.go:225] [ 18436: 18436] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.419929 249972 task_exit.go:204] [ 18436: 18436] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.419975 249972 task_exit.go:204] [ 18436: 18436] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.420563 249972 task_signals.go:204] [ 18436: 18437] Signal 18436, PID: 18437, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.420600 249972 task_exit.go:204] [ 18436: 18437] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.423082 249972 task_exit.go:204] [ 18436: 18437] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.423112 249972 task_exit.go:204] [ 18436: 18437] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.423123 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.423448 249972 task_exit.go:204] [ 18436: 18436] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: semop(0x0, &(0x7f0000000000)=[{}], 0x1f4) D0323 21:16:51.424718 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.424871 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.432194 249972 usertrap_amd64.go:212] [ 18438: 18438] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.432222 249972 usertrap_amd64.go:122] [ 18438: 18438] Allocate a new trap: 0xc0065af110 39 D0323 21:16:51.432321 249972 usertrap_amd64.go:225] [ 18438: 18438] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.432850 249972 usertrap_amd64.go:212] [ 18438: 18438] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.432870 249972 usertrap_amd64.go:122] [ 18438: 18438] Allocate a new trap: 0xc0065af110 40 D0323 21:16:51.432878 249972 usertrap_amd64.go:225] [ 18438: 18438] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.433341 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.433562 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.436493 249972 usertrap_amd64.go:212] [ 18438: 18438] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.436527 249972 usertrap_amd64.go:122] [ 18438: 18438] Allocate a new trap: 0xc0065af110 41 D0323 21:16:51.436537 249972 usertrap_amd64.go:225] [ 18438: 18438] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.444255 249972 usertrap_amd64.go:212] [ 18438: 18438] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.444290 249972 usertrap_amd64.go:122] [ 18438: 18438] Allocate a new trap: 0xc0065af110 42 D0323 21:16:51.444303 249972 usertrap_amd64.go:225] [ 18438: 18438] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.444860 249972 task_exit.go:204] [ 18438: 18438] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.444910 249972 task_exit.go:204] [ 18438: 18438] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.445059 249972 task_signals.go:204] [ 18438: 18439] Signal 18438, PID: 18439, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.445098 249972 task_exit.go:204] [ 18438: 18439] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.449560 249972 task_exit.go:204] [ 18438: 18439] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.449642 249972 task_exit.go:204] [ 18438: 18439] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.449703 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.450238 249972 task_exit.go:204] [ 18438: 18438] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4e, 0x0, 0x0) D0323 21:16:51.454921 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.455040 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.467969 249972 usertrap_amd64.go:212] [ 18440: 18440] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.467999 249972 usertrap_amd64.go:122] [ 18440: 18440] Allocate a new trap: 0xc00880a960 39 D0323 21:16:51.468078 249972 usertrap_amd64.go:225] [ 18440: 18440] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.468483 249972 usertrap_amd64.go:212] [ 18440: 18440] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.468503 249972 usertrap_amd64.go:122] [ 18440: 18440] Allocate a new trap: 0xc00880a960 40 D0323 21:16:51.468510 249972 usertrap_amd64.go:225] [ 18440: 18440] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.469140 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.469346 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.471740 249972 usertrap_amd64.go:212] [ 18440: 18440] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.471766 249972 usertrap_amd64.go:122] [ 18440: 18440] Allocate a new trap: 0xc00880a960 41 D0323 21:16:51.471776 249972 usertrap_amd64.go:225] [ 18440: 18440] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.480279 249972 usertrap_amd64.go:212] [ 18440: 18440] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.480399 249972 usertrap_amd64.go:122] [ 18440: 18440] Allocate a new trap: 0xc00880a960 42 D0323 21:16:51.480437 249972 usertrap_amd64.go:225] [ 18440: 18440] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.480855 249972 task_exit.go:204] [ 18440: 18440] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.480888 249972 task_exit.go:204] [ 18440: 18440] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.480982 249972 task_signals.go:204] [ 18440: 18441] Signal 18440, PID: 18441, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.481014 249972 task_exit.go:204] [ 18440: 18441] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.482666 249972 task_exit.go:204] [ 18440: 18441] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.482692 249972 task_exit.go:204] [ 18440: 18441] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.482705 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.484978 249972 task_exit.go:204] [ 18440: 18440] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x10, &(0x7f0000000000), 0x4) D0323 21:16:51.489417 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.489593 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.497293 249972 usertrap_amd64.go:212] [ 18442: 18442] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.497317 249972 usertrap_amd64.go:122] [ 18442: 18442] Allocate a new trap: 0xc0038beed0 39 D0323 21:16:51.497414 249972 usertrap_amd64.go:225] [ 18442: 18442] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.498015 249972 usertrap_amd64.go:212] [ 18442: 18442] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.498040 249972 usertrap_amd64.go:122] [ 18442: 18442] Allocate a new trap: 0xc0038beed0 40 D0323 21:16:51.498050 249972 usertrap_amd64.go:225] [ 18442: 18442] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.498461 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.498652 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.503288 249972 usertrap_amd64.go:212] [ 18442: 18442] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.503317 249972 usertrap_amd64.go:122] [ 18442: 18442] Allocate a new trap: 0xc0038beed0 41 D0323 21:16:51.503330 249972 usertrap_amd64.go:225] [ 18442: 18442] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.511296 249972 usertrap_amd64.go:212] [ 18442: 18442] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.511339 249972 usertrap_amd64.go:122] [ 18442: 18442] Allocate a new trap: 0xc0038beed0 42 D0323 21:16:51.511356 249972 usertrap_amd64.go:225] [ 18442: 18442] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.511861 249972 task_exit.go:204] [ 18442: 18442] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.511907 249972 task_exit.go:204] [ 18442: 18442] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.511988 249972 task_signals.go:204] [ 18442: 18443] Signal 18442, PID: 18443, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.512027 249972 task_exit.go:204] [ 18442: 18443] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.513533 249972 task_exit.go:204] [ 18442: 18443] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.513577 249972 task_exit.go:204] [ 18442: 18443] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.513596 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.514675 249972 task_exit.go:204] [ 18442: 18442] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0xa2d2}], 0x1f4) semctl$SETALL(0x0, 0x0, 0xe, 0x0) D0323 21:16:51.517365 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.517550 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.530326 249972 usertrap_amd64.go:212] [ 18444: 18444] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.530374 249972 usertrap_amd64.go:122] [ 18444: 18444] Allocate a new trap: 0xc0003ff650 39 D0323 21:16:51.530474 249972 usertrap_amd64.go:225] [ 18444: 18444] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.531064 249972 usertrap_amd64.go:212] [ 18444: 18444] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.531101 249972 usertrap_amd64.go:122] [ 18444: 18444] Allocate a new trap: 0xc0003ff650 40 D0323 21:16:51.531112 249972 usertrap_amd64.go:225] [ 18444: 18444] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.531385 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.531569 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.535623 249972 usertrap_amd64.go:212] [ 18444: 18444] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.535650 249972 usertrap_amd64.go:122] [ 18444: 18444] Allocate a new trap: 0xc0003ff650 41 D0323 21:16:51.535661 249972 usertrap_amd64.go:225] [ 18444: 18444] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.544013 249972 usertrap_amd64.go:212] [ 18444: 18444] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.544050 249972 usertrap_amd64.go:122] [ 18444: 18444] Allocate a new trap: 0xc0003ff650 42 D0323 21:16:51.544070 249972 usertrap_amd64.go:225] [ 18444: 18444] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.544419 249972 task_exit.go:204] [ 18444: 18444] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.544465 249972 task_exit.go:204] [ 18444: 18444] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.544465 249972 task_signals.go:204] [ 18444: 18445] Signal 18444, PID: 18445, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.544660 249972 task_exit.go:204] [ 18444: 18445] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.546394 249972 task_exit.go:204] [ 18444: 18445] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.546994 249972 task_exit.go:204] [ 18444: 18445] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.547031 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.547295 249972 task_exit.go:204] [ 18444: 18444] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x8000, 0x4) D0323 21:16:51.550630 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.550815 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.558639 249972 usertrap_amd64.go:212] [ 18446: 18446] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.558670 249972 usertrap_amd64.go:122] [ 18446: 18446] Allocate a new trap: 0xc009026060 39 D0323 21:16:51.558769 249972 usertrap_amd64.go:225] [ 18446: 18446] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.559251 249972 usertrap_amd64.go:212] [ 18446: 18446] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.559271 249972 usertrap_amd64.go:122] [ 18446: 18446] Allocate a new trap: 0xc009026060 40 D0323 21:16:51.559281 249972 usertrap_amd64.go:225] [ 18446: 18446] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.559996 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.560170 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.562988 249972 usertrap_amd64.go:212] [ 18446: 18446] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.563014 249972 usertrap_amd64.go:122] [ 18446: 18446] Allocate a new trap: 0xc009026060 41 D0323 21:16:51.563030 249972 usertrap_amd64.go:225] [ 18446: 18446] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.571459 249972 usertrap_amd64.go:212] [ 18446: 18446] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.571485 249972 usertrap_amd64.go:122] [ 18446: 18446] Allocate a new trap: 0xc009026060 42 D0323 21:16:51.571497 249972 usertrap_amd64.go:225] [ 18446: 18446] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.571702 249972 task_exit.go:204] [ 18446: 18446] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.571730 249972 task_exit.go:204] [ 18446: 18446] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.572578 249972 task_signals.go:204] [ 18446: 18447] Signal 18446, PID: 18447, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.572645 249972 task_exit.go:204] [ 18446: 18447] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.577273 249972 task_exit.go:204] [ 18446: 18447] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.577306 249972 task_exit.go:204] [ 18446: 18447] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.577328 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.577861 249972 task_exit.go:204] [ 18446: 18446] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x64, 0x0, 0x0, 0xfffffffa}]}) D0323 21:16:51.582135 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.582513 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.594212 249972 usertrap_amd64.go:212] [ 18448: 18448] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.594264 249972 usertrap_amd64.go:122] [ 18448: 18448] Allocate a new trap: 0xc00a424270 39 D0323 21:16:51.594334 249972 usertrap_amd64.go:225] [ 18448: 18448] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.595255 249972 usertrap_amd64.go:212] [ 18448: 18448] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.595336 249972 usertrap_amd64.go:122] [ 18448: 18448] Allocate a new trap: 0xc00a424270 40 D0323 21:16:51.595446 249972 usertrap_amd64.go:225] [ 18448: 18448] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.596411 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.596678 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.600452 249972 usertrap_amd64.go:212] [ 18448: 18448] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.600490 249972 usertrap_amd64.go:122] [ 18448: 18448] Allocate a new trap: 0xc00a424270 41 D0323 21:16:51.600505 249972 usertrap_amd64.go:225] [ 18448: 18448] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.606592 249972 sys_seccomp.go:68] [ 18448: 18449] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0323 21:16:51.607157 249972 usertrap_amd64.go:212] [ 18448: 18448] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.607185 249972 usertrap_amd64.go:122] [ 18448: 18448] Allocate a new trap: 0xc00a424270 42 D0323 21:16:51.607201 249972 usertrap_amd64.go:225] [ 18448: 18448] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.607568 249972 task_exit.go:204] [ 18448: 18448] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.607606 249972 task_exit.go:204] [ 18448: 18448] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.608769 249972 task_signals.go:204] [ 18448: 18449] Signal 18448, PID: 18449, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.608808 249972 task_exit.go:204] [ 18448: 18449] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.609144 249972 task_exit.go:204] [ 18448: 18449] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.609162 249972 task_exit.go:204] [ 18448: 18449] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.609176 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.610036 249972 task_exit.go:204] [ 18448: 18448] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x8000, 0x4) D0323 21:16:51.611815 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.612096 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.625007 249972 usertrap_amd64.go:212] [ 18450: 18450] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.625066 249972 usertrap_amd64.go:122] [ 18450: 18450] Allocate a new trap: 0xc0065af350 39 D0323 21:16:51.625148 249972 usertrap_amd64.go:225] [ 18450: 18450] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.626581 249972 usertrap_amd64.go:212] [ 18450: 18450] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.626616 249972 usertrap_amd64.go:122] [ 18450: 18450] Allocate a new trap: 0xc0065af350 40 D0323 21:16:51.626628 249972 usertrap_amd64.go:225] [ 18450: 18450] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.627225 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.627456 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.630417 249972 usertrap_amd64.go:212] [ 18450: 18450] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.630451 249972 usertrap_amd64.go:122] [ 18450: 18450] Allocate a new trap: 0xc0065af350 41 D0323 21:16:51.630469 249972 usertrap_amd64.go:225] [ 18450: 18450] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.643402 249972 usertrap_amd64.go:212] [ 18450: 18450] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.643434 249972 usertrap_amd64.go:122] [ 18450: 18450] Allocate a new trap: 0xc0065af350 42 D0323 21:16:51.643447 249972 usertrap_amd64.go:225] [ 18450: 18450] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.643863 249972 task_exit.go:204] [ 18450: 18450] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.643899 249972 task_exit.go:204] [ 18450: 18450] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.643915 249972 task_signals.go:204] [ 18450: 18451] Signal 18450, PID: 18451, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.643956 249972 task_exit.go:204] [ 18450: 18451] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.646450 249972 task_exit.go:204] [ 18450: 18451] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.646484 249972 task_exit.go:204] [ 18450: 18451] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.646505 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.647347 249972 task_exit.go:204] [ 18450: 18450] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1a, &(0x7f0000000000), 0x4) D0323 21:16:51.649631 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.650233 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.666109 249972 usertrap_amd64.go:212] [ 18452: 18452] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.666153 249972 usertrap_amd64.go:122] [ 18452: 18452] Allocate a new trap: 0xc004639590 39 D0323 21:16:51.666250 249972 usertrap_amd64.go:225] [ 18452: 18452] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.666634 249972 usertrap_amd64.go:212] [ 18452: 18452] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.666704 249972 usertrap_amd64.go:122] [ 18452: 18452] Allocate a new trap: 0xc004639590 40 D0323 21:16:51.666733 249972 usertrap_amd64.go:225] [ 18452: 18452] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.668280 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.668526 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.674751 249972 usertrap_amd64.go:212] [ 18452: 18452] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.674932 249972 usertrap_amd64.go:122] [ 18452: 18452] Allocate a new trap: 0xc004639590 41 D0323 21:16:51.674953 249972 usertrap_amd64.go:225] [ 18452: 18452] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.685818 249972 usertrap_amd64.go:212] [ 18452: 18452] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.685846 249972 usertrap_amd64.go:122] [ 18452: 18452] Allocate a new trap: 0xc004639590 42 D0323 21:16:51.685857 249972 usertrap_amd64.go:225] [ 18452: 18452] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.686391 249972 task_exit.go:204] [ 18452: 18452] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.686430 249972 task_exit.go:204] [ 18452: 18452] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.686543 249972 task_signals.go:204] [ 18452: 18453] Signal 18452, PID: 18453, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.686669 249972 task_exit.go:204] [ 18452: 18453] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.688160 249972 task_exit.go:204] [ 18452: 18453] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.688184 249972 task_exit.go:204] [ 18452: 18453] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.688194 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.689314 249972 task_exit.go:204] [ 18452: 18452] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x31, 0x0, 0x0) D0323 21:16:51.691661 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.691852 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.700610 249972 usertrap_amd64.go:212] [ 18454: 18454] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.700651 249972 usertrap_amd64.go:122] [ 18454: 18454] Allocate a new trap: 0xc00880af00 39 D0323 21:16:51.700756 249972 usertrap_amd64.go:225] [ 18454: 18454] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.701471 249972 usertrap_amd64.go:212] [ 18454: 18454] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.701482 249972 usertrap_amd64.go:122] [ 18454: 18454] Allocate a new trap: 0xc00880af00 40 D0323 21:16:51.701490 249972 usertrap_amd64.go:225] [ 18454: 18454] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.702043 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.702253 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.705762 249972 usertrap_amd64.go:212] [ 18454: 18454] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.705792 249972 usertrap_amd64.go:122] [ 18454: 18454] Allocate a new trap: 0xc00880af00 41 D0323 21:16:51.705805 249972 usertrap_amd64.go:225] [ 18454: 18454] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.713915 249972 usertrap_amd64.go:212] [ 18454: 18454] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.713945 249972 usertrap_amd64.go:122] [ 18454: 18454] Allocate a new trap: 0xc00880af00 42 D0323 21:16:51.713959 249972 usertrap_amd64.go:225] [ 18454: 18454] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.714440 249972 task_exit.go:204] [ 18454: 18454] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.714483 249972 task_exit.go:204] [ 18454: 18454] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.714573 249972 task_signals.go:204] [ 18454: 18455] Signal 18454, PID: 18455, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.714606 249972 task_exit.go:204] [ 18454: 18455] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.716422 249972 task_exit.go:204] [ 18454: 18455] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.716456 249972 task_exit.go:204] [ 18454: 18455] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.716468 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.719096 249972 task_exit.go:204] [ 18454: 18454] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: semctl$GETVAL(0x0, 0xafb37fd681d0b777, 0xc, 0x0) D0323 21:16:51.720471 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.720664 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.729763 249972 usertrap_amd64.go:212] [ 18456: 18456] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.729793 249972 usertrap_amd64.go:122] [ 18456: 18456] Allocate a new trap: 0xc00880b140 39 D0323 21:16:51.729881 249972 usertrap_amd64.go:225] [ 18456: 18456] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.730575 249972 usertrap_amd64.go:212] [ 18456: 18456] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.730645 249972 usertrap_amd64.go:122] [ 18456: 18456] Allocate a new trap: 0xc00880b140 40 D0323 21:16:51.730689 249972 usertrap_amd64.go:225] [ 18456: 18456] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.733364 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.733599 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.738055 249972 usertrap_amd64.go:212] [ 18456: 18456] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.738087 249972 usertrap_amd64.go:122] [ 18456: 18456] Allocate a new trap: 0xc00880b140 41 D0323 21:16:51.738100 249972 usertrap_amd64.go:225] [ 18456: 18456] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.748366 249972 usertrap_amd64.go:212] [ 18456: 18456] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.748417 249972 usertrap_amd64.go:122] [ 18456: 18456] Allocate a new trap: 0xc00880b140 42 D0323 21:16:51.748434 249972 usertrap_amd64.go:225] [ 18456: 18456] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.750595 249972 task_exit.go:204] [ 18456: 18456] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.750641 249972 task_signals.go:204] [ 18456: 18457] Signal 18456, PID: 18457, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.750660 249972 task_exit.go:204] [ 18456: 18456] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.750712 249972 task_exit.go:204] [ 18456: 18457] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.752758 249972 task_exit.go:204] [ 18456: 18457] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.752791 249972 task_exit.go:204] [ 18456: 18457] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.752807 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.754389 249972 task_exit.go:204] [ 18456: 18456] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x49, &(0x7f0000000000), 0x4) D0323 21:16:51.755963 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.756194 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.769346 249972 usertrap_amd64.go:212] [ 18458: 18458] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.769375 249972 usertrap_amd64.go:122] [ 18458: 18458] Allocate a new trap: 0xc004639830 39 D0323 21:16:51.769514 249972 usertrap_amd64.go:225] [ 18458: 18458] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.770636 249972 usertrap_amd64.go:212] [ 18458: 18458] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.770661 249972 usertrap_amd64.go:122] [ 18458: 18458] Allocate a new trap: 0xc004639830 40 D0323 21:16:51.770672 249972 usertrap_amd64.go:225] [ 18458: 18458] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.771934 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.772141 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.777623 249972 usertrap_amd64.go:212] [ 18458: 18458] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.777652 249972 usertrap_amd64.go:122] [ 18458: 18458] Allocate a new trap: 0xc004639830 41 D0323 21:16:51.777665 249972 usertrap_amd64.go:225] [ 18458: 18458] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.789258 249972 usertrap_amd64.go:212] [ 18458: 18458] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.789338 249972 usertrap_amd64.go:122] [ 18458: 18458] Allocate a new trap: 0xc004639830 42 D0323 21:16:51.789371 249972 usertrap_amd64.go:225] [ 18458: 18458] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.789969 249972 task_exit.go:204] [ 18458: 18458] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.790015 249972 task_exit.go:204] [ 18458: 18458] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.790137 249972 task_signals.go:204] [ 18458: 18459] Signal 18458, PID: 18459, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.790188 249972 task_exit.go:204] [ 18458: 18459] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.791781 249972 task_exit.go:204] [ 18458: 18459] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.791849 249972 task_exit.go:204] [ 18458: 18459] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.791877 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.793329 249972 task_exit.go:204] [ 18458: 18458] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x35, &(0x7f0000000000), 0x4) D0323 21:16:51.795553 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.796077 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.809921 249972 usertrap_amd64.go:212] [ 18460: 18460] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.809949 249972 usertrap_amd64.go:122] [ 18460: 18460] Allocate a new trap: 0xc00aa874d0 39 D0323 21:16:51.810127 249972 usertrap_amd64.go:225] [ 18460: 18460] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.811516 249972 usertrap_amd64.go:212] [ 18460: 18460] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.811579 249972 usertrap_amd64.go:122] [ 18460: 18460] Allocate a new trap: 0xc00aa874d0 40 D0323 21:16:51.811621 249972 usertrap_amd64.go:225] [ 18460: 18460] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.812161 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.812397 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.818481 249972 usertrap_amd64.go:212] [ 18460: 18460] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.818508 249972 usertrap_amd64.go:122] [ 18460: 18460] Allocate a new trap: 0xc00aa874d0 41 D0323 21:16:51.818523 249972 usertrap_amd64.go:225] [ 18460: 18460] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.832687 249972 usertrap_amd64.go:212] [ 18460: 18460] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.832728 249972 usertrap_amd64.go:122] [ 18460: 18460] Allocate a new trap: 0xc00aa874d0 42 D0323 21:16:51.832745 249972 usertrap_amd64.go:225] [ 18460: 18460] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.833293 249972 task_exit.go:204] [ 18460: 18460] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.833336 249972 task_exit.go:204] [ 18460: 18460] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.833353 249972 task_signals.go:204] [ 18460: 18461] Signal 18460, PID: 18461, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.833378 249972 task_exit.go:204] [ 18460: 18461] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.835343 249972 task_exit.go:204] [ 18460: 18461] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.835388 249972 task_exit.go:204] [ 18460: 18461] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.835402 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.836411 249972 task_exit.go:204] [ 18460: 18460] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000011c0)=0x1, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x14, 0x0, &(0x7f0000000200)) D0323 21:16:51.838373 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.838488 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.847876 249972 usertrap_amd64.go:212] [ 18462: 18462] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.847909 249972 usertrap_amd64.go:122] [ 18462: 18462] Allocate a new trap: 0xc0038bf290 39 D0323 21:16:51.848012 249972 usertrap_amd64.go:225] [ 18462: 18462] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.850069 249972 usertrap_amd64.go:212] [ 18462: 18462] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.850099 249972 usertrap_amd64.go:122] [ 18462: 18462] Allocate a new trap: 0xc0038bf290 40 D0323 21:16:51.850107 249972 usertrap_amd64.go:225] [ 18462: 18462] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.850635 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.850873 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.855968 249972 usertrap_amd64.go:212] [ 18462: 18462] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.855994 249972 usertrap_amd64.go:122] [ 18462: 18462] Allocate a new trap: 0xc0038bf290 41 D0323 21:16:51.856006 249972 usertrap_amd64.go:225] [ 18462: 18462] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.865444 249972 usertrap_amd64.go:212] [ 18462: 18462] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.865475 249972 usertrap_amd64.go:122] [ 18462: 18462] Allocate a new trap: 0xc0038bf290 42 D0323 21:16:51.865488 249972 usertrap_amd64.go:225] [ 18462: 18462] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.866036 249972 task_exit.go:204] [ 18462: 18462] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.866080 249972 task_exit.go:204] [ 18462: 18462] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.866164 249972 task_signals.go:204] [ 18462: 18463] Signal 18462, PID: 18463, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.866195 249972 task_exit.go:204] [ 18462: 18463] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.867773 249972 task_exit.go:204] [ 18462: 18463] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.867803 249972 task_exit.go:204] [ 18462: 18463] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.867821 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.868824 249972 task_exit.go:204] [ 18462: 18462] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: prctl$PR_CAPBSET_READ(0x18, 0x26) D0323 21:16:51.871860 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.872044 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.879978 249972 usertrap_amd64.go:212] [ 18464: 18464] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.880066 249972 usertrap_amd64.go:122] [ 18464: 18464] Allocate a new trap: 0xc0046399e0 39 D0323 21:16:51.880183 249972 usertrap_amd64.go:225] [ 18464: 18464] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.881297 249972 usertrap_amd64.go:212] [ 18464: 18464] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.881319 249972 usertrap_amd64.go:122] [ 18464: 18464] Allocate a new trap: 0xc0046399e0 40 D0323 21:16:51.881327 249972 usertrap_amd64.go:225] [ 18464: 18464] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.882161 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.882331 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.889331 249972 usertrap_amd64.go:212] [ 18464: 18464] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.889366 249972 usertrap_amd64.go:122] [ 18464: 18464] Allocate a new trap: 0xc0046399e0 41 D0323 21:16:51.889381 249972 usertrap_amd64.go:225] [ 18464: 18464] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.897776 249972 usertrap_amd64.go:212] [ 18464: 18464] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.897808 249972 usertrap_amd64.go:122] [ 18464: 18464] Allocate a new trap: 0xc0046399e0 42 D0323 21:16:51.897841 249972 usertrap_amd64.go:225] [ 18464: 18464] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.898300 249972 task_exit.go:204] [ 18464: 18464] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.898354 249972 task_exit.go:204] [ 18464: 18464] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.898409 249972 task_signals.go:204] [ 18464: 18465] Signal 18464, PID: 18465, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.898431 249972 task_exit.go:204] [ 18464: 18465] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.900436 249972 task_exit.go:204] [ 18464: 18465] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.900475 249972 task_exit.go:204] [ 18464: 18465] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.900497 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.901294 249972 task_exit.go:204] [ 18464: 18464] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000040)=0x36, 0x4) D0323 21:16:51.921627 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.921788 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.936878 249972 usertrap_amd64.go:212] [ 18466: 18466] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.936901 249972 usertrap_amd64.go:122] [ 18466: 18466] Allocate a new trap: 0xc0090266c0 39 D0323 21:16:51.937036 249972 usertrap_amd64.go:225] [ 18466: 18466] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.938558 249972 usertrap_amd64.go:212] [ 18466: 18466] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.938587 249972 usertrap_amd64.go:122] [ 18466: 18466] Allocate a new trap: 0xc0090266c0 40 D0323 21:16:51.938601 249972 usertrap_amd64.go:225] [ 18466: 18466] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.940333 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.940554 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.945115 249972 usertrap_amd64.go:212] [ 18466: 18466] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.945195 249972 usertrap_amd64.go:122] [ 18466: 18466] Allocate a new trap: 0xc0090266c0 41 D0323 21:16:51.945220 249972 usertrap_amd64.go:225] [ 18466: 18466] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.954330 249972 usertrap_amd64.go:212] [ 18466: 18466] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.954374 249972 usertrap_amd64.go:122] [ 18466: 18466] Allocate a new trap: 0xc0090266c0 42 D0323 21:16:51.954389 249972 usertrap_amd64.go:225] [ 18466: 18466] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.955501 249972 task_exit.go:204] [ 18466: 18466] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.955547 249972 task_exit.go:204] [ 18466: 18466] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.955602 249972 task_signals.go:204] [ 18466: 18467] Signal 18466, PID: 18467, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.955635 249972 task_exit.go:204] [ 18466: 18467] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.957413 249972 task_exit.go:204] [ 18466: 18467] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.957441 249972 task_exit.go:204] [ 18466: 18467] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.957462 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.958634 249972 task_exit.go:204] [ 18466: 18466] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:51 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{0x0, 0x3938700}}, 0x0) D0323 21:16:51.960705 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.960875 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.971581 249972 usertrap_amd64.go:212] [ 18468: 18468] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:51.971633 249972 usertrap_amd64.go:122] [ 18468: 18468] Allocate a new trap: 0xc00aa87830 39 D0323 21:16:51.971769 249972 usertrap_amd64.go:225] [ 18468: 18468] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:51.972824 249972 usertrap_amd64.go:212] [ 18468: 18468] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:51.972851 249972 usertrap_amd64.go:122] [ 18468: 18468] Allocate a new trap: 0xc00aa87830 40 D0323 21:16:51.972864 249972 usertrap_amd64.go:225] [ 18468: 18468] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:51.973717 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:51.973945 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:51.977606 249972 usertrap_amd64.go:212] [ 18468: 18468] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:51.977644 249972 usertrap_amd64.go:122] [ 18468: 18468] Allocate a new trap: 0xc00aa87830 41 D0323 21:16:51.977662 249972 usertrap_amd64.go:225] [ 18468: 18468] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:51.984410 249972 usertrap_amd64.go:212] [ 18468: 18468] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:51.984449 249972 usertrap_amd64.go:122] [ 18468: 18468] Allocate a new trap: 0xc00aa87830 42 D0323 21:16:51.984461 249972 usertrap_amd64.go:225] [ 18468: 18468] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:51.984997 249972 task_exit.go:204] [ 18468: 18468] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.985090 249972 task_exit.go:204] [ 18468: 18468] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.985265 249972 task_signals.go:204] [ 18468: 18469] Signal 18468, PID: 18469, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:51.985297 249972 task_exit.go:204] [ 18468: 18469] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:51.986596 249972 task_exit.go:204] [ 18468: 18469] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:51.986649 249972 task_exit.go:204] [ 18468: 18469] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.986664 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:51.987573 249972 task_exit.go:204] [ 18468: 18468] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:51.990474 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:51.990661 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:51 executing program 0: r0 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000402) D0323 21:16:52.008216 249972 usertrap_amd64.go:212] [ 18470: 18470] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.008242 249972 usertrap_amd64.go:122] [ 18470: 18470] Allocate a new trap: 0xc00aa878c0 39 D0323 21:16:52.008347 249972 usertrap_amd64.go:225] [ 18470: 18470] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.009159 249972 usertrap_amd64.go:212] [ 18470: 18470] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.009222 249972 usertrap_amd64.go:122] [ 18470: 18470] Allocate a new trap: 0xc00aa878c0 40 D0323 21:16:52.009238 249972 usertrap_amd64.go:225] [ 18470: 18470] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.017478 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.018022 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.028036 249972 usertrap_amd64.go:212] [ 18470: 18470] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.028084 249972 usertrap_amd64.go:122] [ 18470: 18470] Allocate a new trap: 0xc00aa878c0 41 D0323 21:16:52.028109 249972 usertrap_amd64.go:225] [ 18470: 18470] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) I0323 21:16:52.036187 249972 pgalloc.go:658] Disabling pgalloc.MemoryFile.AllocateAndFill pre-population: mlock failed: cannot allocate memory D0323 21:16:52.036818 249972 usertrap_amd64.go:212] [ 18470: 18470] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.036852 249972 usertrap_amd64.go:122] [ 18470: 18470] Allocate a new trap: 0xc00aa878c0 42 D0323 21:16:52.036875 249972 usertrap_amd64.go:225] [ 18470: 18470] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.037575 249972 task_exit.go:204] [ 18470: 18470] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.037663 249972 task_exit.go:204] [ 18470: 18470] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.037691 249972 task_signals.go:204] [ 18470: 18471] Signal 18470, PID: 18471, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.037716 249972 task_exit.go:204] [ 18470: 18471] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.039919 249972 task_exit.go:204] [ 18470: 18471] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.039961 249972 task_exit.go:204] [ 18470: 18471] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.039989 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.041179 249972 task_exit.go:204] [ 18470: 18470] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) D0323 21:16:52.042835 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.043089 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.053444 249972 usertrap_amd64.go:212] [ 18472: 18472] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.053495 249972 usertrap_amd64.go:122] [ 18472: 18472] Allocate a new trap: 0xc007fabe30 39 D0323 21:16:52.053575 249972 usertrap_amd64.go:225] [ 18472: 18472] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.055082 249972 usertrap_amd64.go:212] [ 18472: 18472] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.055105 249972 usertrap_amd64.go:122] [ 18472: 18472] Allocate a new trap: 0xc007fabe30 40 D0323 21:16:52.055122 249972 usertrap_amd64.go:225] [ 18472: 18472] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.056343 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.056599 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.060411 249972 usertrap_amd64.go:212] [ 18472: 18472] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.060451 249972 usertrap_amd64.go:122] [ 18472: 18472] Allocate a new trap: 0xc007fabe30 41 D0323 21:16:52.060465 249972 usertrap_amd64.go:225] [ 18472: 18472] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.069646 249972 usertrap_amd64.go:212] [ 18472: 18472] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.069731 249972 usertrap_amd64.go:122] [ 18472: 18472] Allocate a new trap: 0xc007fabe30 42 D0323 21:16:52.069814 249972 usertrap_amd64.go:225] [ 18472: 18472] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.070313 249972 task_exit.go:204] [ 18472: 18472] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.070356 249972 task_exit.go:204] [ 18472: 18472] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.070429 249972 task_signals.go:204] [ 18472: 18473] Signal 18472, PID: 18473, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.070467 249972 task_exit.go:204] [ 18472: 18473] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.072322 249972 task_exit.go:204] [ 18472: 18473] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.072410 249972 task_exit.go:204] [ 18472: 18473] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.072452 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.073859 249972 task_exit.go:204] [ 18472: 18472] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000000)={0x805}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000280), 0x10) D0323 21:16:52.082229 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.082438 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.093034 249972 usertrap_amd64.go:212] [ 18474: 18474] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.093075 249972 usertrap_amd64.go:122] [ 18474: 18474] Allocate a new trap: 0xc00aa87b30 39 D0323 21:16:52.093163 249972 usertrap_amd64.go:225] [ 18474: 18474] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.095389 249972 usertrap_amd64.go:212] [ 18474: 18474] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.095424 249972 usertrap_amd64.go:122] [ 18474: 18474] Allocate a new trap: 0xc00aa87b30 40 D0323 21:16:52.095439 249972 usertrap_amd64.go:225] [ 18474: 18474] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.096376 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.097136 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.100852 249972 usertrap_amd64.go:212] [ 18474: 18474] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.100878 249972 usertrap_amd64.go:122] [ 18474: 18474] Allocate a new trap: 0xc00aa87b30 41 D0323 21:16:52.100919 249972 usertrap_amd64.go:225] [ 18474: 18474] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.113920 249972 usertrap_amd64.go:212] [ 18474: 18474] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.113968 249972 usertrap_amd64.go:122] [ 18474: 18474] Allocate a new trap: 0xc00aa87b30 42 D0323 21:16:52.113995 249972 usertrap_amd64.go:225] [ 18474: 18474] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.114436 249972 task_exit.go:204] [ 18474: 18474] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.114484 249972 task_exit.go:204] [ 18474: 18474] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.114794 249972 task_signals.go:204] [ 18474: 18475] Signal 18474, PID: 18475, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.114826 249972 task_exit.go:204] [ 18474: 18475] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.116346 249972 task_exit.go:204] [ 18474: 18475] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.116380 249972 task_exit.go:204] [ 18474: 18475] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.116394 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.117635 249972 task_exit.go:204] [ 18474: 18474] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1d, 0x0, 0x0) D0323 21:16:52.118515 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.118725 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.130609 249972 usertrap_amd64.go:212] [ 18476: 18476] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.130699 249972 usertrap_amd64.go:122] [ 18476: 18476] Allocate a new trap: 0xc0038bf650 39 D0323 21:16:52.130813 249972 usertrap_amd64.go:225] [ 18476: 18476] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.133634 249972 usertrap_amd64.go:212] [ 18476: 18476] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.133765 249972 usertrap_amd64.go:122] [ 18476: 18476] Allocate a new trap: 0xc0038bf650 40 D0323 21:16:52.133791 249972 usertrap_amd64.go:225] [ 18476: 18476] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.134544 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.134787 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.140667 249972 usertrap_amd64.go:212] [ 18476: 18476] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.140720 249972 usertrap_amd64.go:122] [ 18476: 18476] Allocate a new trap: 0xc0038bf650 41 D0323 21:16:52.140737 249972 usertrap_amd64.go:225] [ 18476: 18476] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.155809 249972 usertrap_amd64.go:212] [ 18476: 18476] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.155893 249972 usertrap_amd64.go:122] [ 18476: 18476] Allocate a new trap: 0xc0038bf650 42 D0323 21:16:52.155920 249972 usertrap_amd64.go:225] [ 18476: 18476] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.165494 249972 task_exit.go:204] [ 18476: 18476] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.165571 249972 task_exit.go:204] [ 18476: 18476] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.167140 249972 task_signals.go:204] [ 18476: 18477] Signal 18476, PID: 18477, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.167180 249972 task_exit.go:204] [ 18476: 18477] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.167468 249972 task_exit.go:204] [ 18476: 18477] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.167493 249972 task_exit.go:204] [ 18476: 18477] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.167515 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.172679 249972 task_exit.go:204] [ 18476: 18476] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.176298 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.177176 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:52 executing program 0: semctl$GETVAL(0x0, 0x0, 0x3, 0x0) D0323 21:16:52.196591 249972 usertrap_amd64.go:212] [ 18478: 18478] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.196663 249972 usertrap_amd64.go:122] [ 18478: 18478] Allocate a new trap: 0xc00aa87d70 39 D0323 21:16:52.196739 249972 usertrap_amd64.go:225] [ 18478: 18478] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.197483 249972 usertrap_amd64.go:212] [ 18478: 18478] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.197506 249972 usertrap_amd64.go:122] [ 18478: 18478] Allocate a new trap: 0xc00aa87d70 40 D0323 21:16:52.197517 249972 usertrap_amd64.go:225] [ 18478: 18478] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.198395 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.198571 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.203812 249972 usertrap_amd64.go:212] [ 18478: 18478] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.203840 249972 usertrap_amd64.go:122] [ 18478: 18478] Allocate a new trap: 0xc00aa87d70 41 D0323 21:16:52.203852 249972 usertrap_amd64.go:225] [ 18478: 18478] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.212486 249972 usertrap_amd64.go:212] [ 18478: 18478] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.212538 249972 usertrap_amd64.go:122] [ 18478: 18478] Allocate a new trap: 0xc00aa87d70 42 D0323 21:16:52.212555 249972 usertrap_amd64.go:225] [ 18478: 18478] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.212991 249972 task_exit.go:204] [ 18478: 18478] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.213050 249972 task_exit.go:204] [ 18478: 18478] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.213884 249972 task_signals.go:204] [ 18478: 18479] Signal 18478, PID: 18479, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.213931 249972 task_exit.go:204] [ 18478: 18479] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.215742 249972 task_exit.go:204] [ 18478: 18479] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.215789 249972 task_exit.go:204] [ 18478: 18479] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.215823 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.218088 249972 task_exit.go:204] [ 18478: 18478] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x43, &(0x7f0000000000), 0x4) D0323 21:16:52.220345 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.220566 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.228750 249972 usertrap_amd64.go:212] [ 18480: 18480] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.228812 249972 usertrap_amd64.go:122] [ 18480: 18480] Allocate a new trap: 0xc00aa87e30 39 D0323 21:16:52.228880 249972 usertrap_amd64.go:225] [ 18480: 18480] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.229877 249972 usertrap_amd64.go:212] [ 18480: 18480] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.229917 249972 usertrap_amd64.go:122] [ 18480: 18480] Allocate a new trap: 0xc00aa87e30 40 D0323 21:16:52.229933 249972 usertrap_amd64.go:225] [ 18480: 18480] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.230616 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.230871 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.235367 249972 usertrap_amd64.go:212] [ 18480: 18480] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.235402 249972 usertrap_amd64.go:122] [ 18480: 18480] Allocate a new trap: 0xc00aa87e30 41 D0323 21:16:52.235419 249972 usertrap_amd64.go:225] [ 18480: 18480] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.248979 249972 usertrap_amd64.go:212] [ 18480: 18480] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.249010 249972 usertrap_amd64.go:122] [ 18480: 18480] Allocate a new trap: 0xc00aa87e30 42 D0323 21:16:52.249028 249972 usertrap_amd64.go:225] [ 18480: 18480] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.249358 249972 task_exit.go:204] [ 18480: 18480] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.249382 249972 task_exit.go:204] [ 18480: 18480] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.249447 249972 task_signals.go:204] [ 18480: 18481] Signal 18480, PID: 18481, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.249474 249972 task_exit.go:204] [ 18480: 18481] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.253268 249972 task_exit.go:204] [ 18480: 18481] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.253297 249972 task_exit.go:204] [ 18480: 18481] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.253311 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.256137 249972 task_exit.go:204] [ 18480: 18480] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x6, 0x0, 0x0) D0323 21:16:52.257915 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.258081 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.269610 249972 usertrap_amd64.go:212] [ 18482: 18482] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.269659 249972 usertrap_amd64.go:122] [ 18482: 18482] Allocate a new trap: 0xc004639aa0 39 D0323 21:16:52.269781 249972 usertrap_amd64.go:225] [ 18482: 18482] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.270698 249972 usertrap_amd64.go:212] [ 18482: 18482] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.270728 249972 usertrap_amd64.go:122] [ 18482: 18482] Allocate a new trap: 0xc004639aa0 40 D0323 21:16:52.270739 249972 usertrap_amd64.go:225] [ 18482: 18482] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.271595 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.271810 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.275482 249972 usertrap_amd64.go:212] [ 18482: 18482] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.275510 249972 usertrap_amd64.go:122] [ 18482: 18482] Allocate a new trap: 0xc004639aa0 41 D0323 21:16:52.275531 249972 usertrap_amd64.go:225] [ 18482: 18482] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.286913 249972 usertrap_amd64.go:212] [ 18482: 18482] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.286964 249972 usertrap_amd64.go:122] [ 18482: 18482] Allocate a new trap: 0xc004639aa0 42 D0323 21:16:52.286980 249972 usertrap_amd64.go:225] [ 18482: 18482] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.287589 249972 task_exit.go:204] [ 18482: 18482] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.287628 249972 task_exit.go:204] [ 18482: 18482] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.287723 249972 task_signals.go:204] [ 18482: 18483] Signal 18482, PID: 18483, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.287765 249972 task_exit.go:204] [ 18482: 18483] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.289466 249972 task_exit.go:204] [ 18482: 18483] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.289502 249972 task_exit.go:204] [ 18482: 18483] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.289521 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.290619 249972 task_exit.go:204] [ 18482: 18482] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.293015 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.293221 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:52 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0xd, 0x0, 0x10) D0323 21:16:52.305271 249972 usertrap_amd64.go:212] [ 18484: 18484] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.305310 249972 usertrap_amd64.go:122] [ 18484: 18484] Allocate a new trap: 0xc00a4243c0 39 D0323 21:16:52.305429 249972 usertrap_amd64.go:225] [ 18484: 18484] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.306977 249972 usertrap_amd64.go:212] [ 18484: 18484] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.307014 249972 usertrap_amd64.go:122] [ 18484: 18484] Allocate a new trap: 0xc00a4243c0 40 D0323 21:16:52.307040 249972 usertrap_amd64.go:225] [ 18484: 18484] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.308134 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.308335 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.314150 249972 usertrap_amd64.go:212] [ 18484: 18484] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.314224 249972 usertrap_amd64.go:122] [ 18484: 18484] Allocate a new trap: 0xc00a4243c0 41 D0323 21:16:52.314264 249972 usertrap_amd64.go:225] [ 18484: 18484] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.326952 249972 usertrap_amd64.go:212] [ 18484: 18484] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.327056 249972 usertrap_amd64.go:122] [ 18484: 18484] Allocate a new trap: 0xc00a4243c0 42 D0323 21:16:52.327082 249972 usertrap_amd64.go:225] [ 18484: 18484] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.327587 249972 task_exit.go:204] [ 18484: 18484] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.327634 249972 task_exit.go:204] [ 18484: 18484] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.327735 249972 task_signals.go:204] [ 18484: 18485] Signal 18484, PID: 18485, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.327769 249972 task_exit.go:204] [ 18484: 18485] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.330059 249972 task_exit.go:204] [ 18484: 18485] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.330090 249972 task_exit.go:204] [ 18484: 18485] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.330103 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.331241 249972 task_exit.go:204] [ 18484: 18484] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000040)=0x8000, 0x4) D0323 21:16:52.336818 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.337066 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.346885 249972 usertrap_amd64.go:212] [ 18486: 18486] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.346914 249972 usertrap_amd64.go:122] [ 18486: 18486] Allocate a new trap: 0xc004639c20 39 D0323 21:16:52.347033 249972 usertrap_amd64.go:225] [ 18486: 18486] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.347840 249972 usertrap_amd64.go:212] [ 18486: 18486] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.347863 249972 usertrap_amd64.go:122] [ 18486: 18486] Allocate a new trap: 0xc004639c20 40 D0323 21:16:52.347875 249972 usertrap_amd64.go:225] [ 18486: 18486] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.348235 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.348465 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.351041 249972 usertrap_amd64.go:212] [ 18486: 18486] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.351068 249972 usertrap_amd64.go:122] [ 18486: 18486] Allocate a new trap: 0xc004639c20 41 D0323 21:16:52.351079 249972 usertrap_amd64.go:225] [ 18486: 18486] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.362630 249972 usertrap_amd64.go:212] [ 18486: 18486] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.362672 249972 usertrap_amd64.go:122] [ 18486: 18486] Allocate a new trap: 0xc004639c20 42 D0323 21:16:52.362692 249972 usertrap_amd64.go:225] [ 18486: 18486] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.363258 249972 task_exit.go:204] [ 18486: 18486] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.363297 249972 task_exit.go:204] [ 18486: 18486] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.363948 249972 task_signals.go:204] [ 18486: 18487] Signal 18486, PID: 18487, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.364032 249972 task_exit.go:204] [ 18486: 18487] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.365365 249972 task_exit.go:204] [ 18486: 18487] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.365409 249972 task_exit.go:204] [ 18486: 18487] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.365490 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.366281 249972 task_exit.go:204] [ 18486: 18486] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x42, &(0x7f0000000000), 0x4) D0323 21:16:52.373298 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.374060 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.393786 249972 usertrap_amd64.go:212] [ 18488: 18488] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.393815 249972 usertrap_amd64.go:122] [ 18488: 18488] Allocate a new trap: 0xc008102030 39 D0323 21:16:52.393927 249972 usertrap_amd64.go:225] [ 18488: 18488] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.394741 249972 usertrap_amd64.go:212] [ 18488: 18488] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.394770 249972 usertrap_amd64.go:122] [ 18488: 18488] Allocate a new trap: 0xc008102030 40 D0323 21:16:52.394783 249972 usertrap_amd64.go:225] [ 18488: 18488] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.395275 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.395799 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.401021 249972 usertrap_amd64.go:212] [ 18488: 18488] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.401046 249972 usertrap_amd64.go:122] [ 18488: 18488] Allocate a new trap: 0xc008102030 41 D0323 21:16:52.401055 249972 usertrap_amd64.go:225] [ 18488: 18488] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.410170 249972 usertrap_amd64.go:212] [ 18488: 18488] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.410192 249972 usertrap_amd64.go:122] [ 18488: 18488] Allocate a new trap: 0xc008102030 42 D0323 21:16:52.410202 249972 usertrap_amd64.go:225] [ 18488: 18488] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.411602 249972 task_exit.go:204] [ 18488: 18488] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.411648 249972 task_exit.go:204] [ 18488: 18488] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.411714 249972 task_signals.go:204] [ 18488: 18489] Signal 18488, PID: 18489, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.411794 249972 task_exit.go:204] [ 18488: 18489] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.413599 249972 task_exit.go:204] [ 18488: 18489] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.413655 249972 task_exit.go:204] [ 18488: 18489] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.413671 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.414198 249972 task_exit.go:204] [ 18488: 18488] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1e, 0x0, 0x0) D0323 21:16:52.417478 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.417655 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.427716 249972 usertrap_amd64.go:212] [ 18490: 18490] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.427758 249972 usertrap_amd64.go:122] [ 18490: 18490] Allocate a new trap: 0xc00880b8f0 39 D0323 21:16:52.427828 249972 usertrap_amd64.go:225] [ 18490: 18490] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.429206 249972 usertrap_amd64.go:212] [ 18490: 18490] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.429238 249972 usertrap_amd64.go:122] [ 18490: 18490] Allocate a new trap: 0xc00880b8f0 40 D0323 21:16:52.429250 249972 usertrap_amd64.go:225] [ 18490: 18490] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.431465 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.431722 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.439118 249972 usertrap_amd64.go:212] [ 18490: 18490] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.439166 249972 usertrap_amd64.go:122] [ 18490: 18490] Allocate a new trap: 0xc00880b8f0 41 D0323 21:16:52.439179 249972 usertrap_amd64.go:225] [ 18490: 18490] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.447036 249972 usertrap_amd64.go:212] [ 18490: 18490] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.447070 249972 usertrap_amd64.go:122] [ 18490: 18490] Allocate a new trap: 0xc00880b8f0 42 D0323 21:16:52.447085 249972 usertrap_amd64.go:225] [ 18490: 18490] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.447529 249972 task_exit.go:204] [ 18490: 18490] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.447567 249972 task_exit.go:204] [ 18490: 18490] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.447669 249972 task_signals.go:204] [ 18490: 18491] Signal 18490, PID: 18491, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.447723 249972 task_exit.go:204] [ 18490: 18491] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.449543 249972 task_exit.go:204] [ 18490: 18491] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.449661 249972 task_exit.go:204] [ 18490: 18491] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.449707 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.450971 249972 task_exit.go:204] [ 18490: 18490] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) D0323 21:16:52.451995 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.452169 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.461784 249972 usertrap_amd64.go:212] [ 18492: 18492] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.461826 249972 usertrap_amd64.go:122] [ 18492: 18492] Allocate a new trap: 0xc0038bf7d0 39 D0323 21:16:52.461936 249972 usertrap_amd64.go:225] [ 18492: 18492] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.462632 249972 usertrap_amd64.go:212] [ 18492: 18492] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.462650 249972 usertrap_amd64.go:122] [ 18492: 18492] Allocate a new trap: 0xc0038bf7d0 40 D0323 21:16:52.462661 249972 usertrap_amd64.go:225] [ 18492: 18492] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.463789 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.463976 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.468197 249972 usertrap_amd64.go:212] [ 18492: 18492] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.468244 249972 usertrap_amd64.go:122] [ 18492: 18492] Allocate a new trap: 0xc0038bf7d0 41 D0323 21:16:52.468260 249972 usertrap_amd64.go:225] [ 18492: 18492] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.481213 249972 usertrap_amd64.go:212] [ 18492: 18492] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.481244 249972 usertrap_amd64.go:122] [ 18492: 18492] Allocate a new trap: 0xc0038bf7d0 42 D0323 21:16:52.481258 249972 usertrap_amd64.go:225] [ 18492: 18492] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.481651 249972 task_exit.go:204] [ 18492: 18492] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.481719 249972 task_exit.go:204] [ 18492: 18492] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.483209 249972 task_signals.go:204] [ 18492: 18493] Signal 18492, PID: 18493, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.483241 249972 task_exit.go:204] [ 18492: 18493] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.483633 249972 task_exit.go:204] [ 18492: 18493] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.483657 249972 task_exit.go:204] [ 18492: 18493] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.483671 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.484834 249972 task_exit.go:204] [ 18492: 18492] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), 0x4) D0323 21:16:52.486271 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.486410 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.498165 249972 usertrap_amd64.go:212] [ 18494: 18494] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.498207 249972 usertrap_amd64.go:122] [ 18494: 18494] Allocate a new trap: 0xc0065af500 39 D0323 21:16:52.498301 249972 usertrap_amd64.go:225] [ 18494: 18494] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.499334 249972 usertrap_amd64.go:212] [ 18494: 18494] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.499360 249972 usertrap_amd64.go:122] [ 18494: 18494] Allocate a new trap: 0xc0065af500 40 D0323 21:16:52.499379 249972 usertrap_amd64.go:225] [ 18494: 18494] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.500359 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.500558 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.504478 249972 usertrap_amd64.go:212] [ 18494: 18494] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.504510 249972 usertrap_amd64.go:122] [ 18494: 18494] Allocate a new trap: 0xc0065af500 41 D0323 21:16:52.504525 249972 usertrap_amd64.go:225] [ 18494: 18494] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.516699 249972 usertrap_amd64.go:212] [ 18494: 18494] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.516752 249972 usertrap_amd64.go:122] [ 18494: 18494] Allocate a new trap: 0xc0065af500 42 D0323 21:16:52.516769 249972 usertrap_amd64.go:225] [ 18494: 18494] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.517537 249972 task_exit.go:204] [ 18494: 18494] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.517590 249972 task_exit.go:204] [ 18494: 18494] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.517724 249972 task_signals.go:204] [ 18494: 18495] Signal 18494, PID: 18495, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.517748 249972 task_exit.go:204] [ 18494: 18495] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.520140 249972 task_exit.go:204] [ 18494: 18495] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.520174 249972 task_exit.go:204] [ 18494: 18495] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.520196 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.520377 249972 task_exit.go:204] [ 18494: 18494] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0xa2d2}], 0x1f4) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) D0323 21:16:52.522659 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.522869 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.536527 249972 usertrap_amd64.go:212] [ 18496: 18496] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.536563 249972 usertrap_amd64.go:122] [ 18496: 18496] Allocate a new trap: 0xc0038bf8c0 39 D0323 21:16:52.536664 249972 usertrap_amd64.go:225] [ 18496: 18496] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.537147 249972 usertrap_amd64.go:212] [ 18496: 18496] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.537168 249972 usertrap_amd64.go:122] [ 18496: 18496] Allocate a new trap: 0xc0038bf8c0 40 D0323 21:16:52.537181 249972 usertrap_amd64.go:225] [ 18496: 18496] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.537851 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.538045 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.541352 249972 usertrap_amd64.go:212] [ 18496: 18496] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.541381 249972 usertrap_amd64.go:122] [ 18496: 18496] Allocate a new trap: 0xc0038bf8c0 41 D0323 21:16:52.541394 249972 usertrap_amd64.go:225] [ 18496: 18496] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.551022 249972 usertrap_amd64.go:212] [ 18496: 18496] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.551078 249972 usertrap_amd64.go:122] [ 18496: 18496] Allocate a new trap: 0xc0038bf8c0 42 D0323 21:16:52.551091 249972 usertrap_amd64.go:225] [ 18496: 18496] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.551437 249972 task_exit.go:204] [ 18496: 18496] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.551471 249972 task_exit.go:204] [ 18496: 18496] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.551565 249972 task_signals.go:204] [ 18496: 18497] Signal 18496, PID: 18497, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.551628 249972 task_exit.go:204] [ 18496: 18497] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.554225 249972 task_exit.go:204] [ 18496: 18497] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.554271 249972 task_exit.go:204] [ 18496: 18497] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.554288 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.556334 249972 task_exit.go:204] [ 18496: 18496] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket(0x11, 0x2, 0x0) connect$netlink(r0, &(0x7f0000000040), 0xc) D0323 21:16:52.557709 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.557890 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.566723 249972 usertrap_amd64.go:212] [ 18498: 18498] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.566758 249972 usertrap_amd64.go:122] [ 18498: 18498] Allocate a new trap: 0xc009026f90 39 D0323 21:16:52.566919 249972 usertrap_amd64.go:225] [ 18498: 18498] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.568172 249972 usertrap_amd64.go:212] [ 18498: 18498] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.568193 249972 usertrap_amd64.go:122] [ 18498: 18498] Allocate a new trap: 0xc009026f90 40 D0323 21:16:52.568201 249972 usertrap_amd64.go:225] [ 18498: 18498] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.568972 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.569206 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.573318 249972 usertrap_amd64.go:212] [ 18498: 18498] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.573346 249972 usertrap_amd64.go:122] [ 18498: 18498] Allocate a new trap: 0xc009026f90 41 D0323 21:16:52.573359 249972 usertrap_amd64.go:225] [ 18498: 18498] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.583593 249972 usertrap_amd64.go:212] [ 18498: 18498] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.583623 249972 usertrap_amd64.go:122] [ 18498: 18498] Allocate a new trap: 0xc009026f90 42 D0323 21:16:52.583635 249972 usertrap_amd64.go:225] [ 18498: 18498] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.584021 249972 task_exit.go:204] [ 18498: 18498] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.584077 249972 task_exit.go:204] [ 18498: 18498] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.584160 249972 task_signals.go:204] [ 18498: 18499] Signal 18498, PID: 18499, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.584189 249972 task_exit.go:204] [ 18498: 18499] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.586878 249972 task_exit.go:204] [ 18498: 18499] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.586908 249972 task_exit.go:204] [ 18498: 18499] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.586923 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.587726 249972 task_exit.go:204] [ 18498: 18498] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) D0323 21:16:52.589355 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.589804 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.600053 249972 usertrap_amd64.go:212] [ 18500: 18500] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.600084 249972 usertrap_amd64.go:122] [ 18500: 18500] Allocate a new trap: 0xc0038bfb90 39 D0323 21:16:52.600164 249972 usertrap_amd64.go:225] [ 18500: 18500] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.601176 249972 usertrap_amd64.go:212] [ 18500: 18500] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.601205 249972 usertrap_amd64.go:122] [ 18500: 18500] Allocate a new trap: 0xc0038bfb90 40 D0323 21:16:52.601220 249972 usertrap_amd64.go:225] [ 18500: 18500] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.602289 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.602463 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.606266 249972 usertrap_amd64.go:212] [ 18500: 18500] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.606293 249972 usertrap_amd64.go:122] [ 18500: 18500] Allocate a new trap: 0xc0038bfb90 41 D0323 21:16:52.606306 249972 usertrap_amd64.go:225] [ 18500: 18500] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.615039 249972 usertrap_amd64.go:212] [ 18500: 18500] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.615077 249972 usertrap_amd64.go:122] [ 18500: 18500] Allocate a new trap: 0xc0038bfb90 42 D0323 21:16:52.615092 249972 usertrap_amd64.go:225] [ 18500: 18500] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.615397 249972 task_exit.go:204] [ 18500: 18500] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.615442 249972 task_exit.go:204] [ 18500: 18500] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.615501 249972 task_signals.go:204] [ 18500: 18501] Signal 18500, PID: 18501, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.615532 249972 task_exit.go:204] [ 18500: 18501] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.617146 249972 task_exit.go:204] [ 18500: 18501] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.617179 249972 task_exit.go:204] [ 18500: 18501] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.617198 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.617574 249972 task_exit.go:204] [ 18500: 18500] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x5, 0x0, 0x0) D0323 21:16:52.619070 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.619243 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.629754 249972 usertrap_amd64.go:212] [ 18502: 18502] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.629786 249972 usertrap_amd64.go:122] [ 18502: 18502] Allocate a new trap: 0xc0038bfe00 39 D0323 21:16:52.629872 249972 usertrap_amd64.go:225] [ 18502: 18502] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.631166 249972 usertrap_amd64.go:212] [ 18502: 18502] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.631192 249972 usertrap_amd64.go:122] [ 18502: 18502] Allocate a new trap: 0xc0038bfe00 40 D0323 21:16:52.631202 249972 usertrap_amd64.go:225] [ 18502: 18502] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.632617 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.633049 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.636842 249972 usertrap_amd64.go:212] [ 18502: 18502] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.636871 249972 usertrap_amd64.go:122] [ 18502: 18502] Allocate a new trap: 0xc0038bfe00 41 D0323 21:16:52.636885 249972 usertrap_amd64.go:225] [ 18502: 18502] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.648369 249972 usertrap_amd64.go:212] [ 18502: 18502] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.648400 249972 usertrap_amd64.go:122] [ 18502: 18502] Allocate a new trap: 0xc0038bfe00 42 D0323 21:16:52.648415 249972 usertrap_amd64.go:225] [ 18502: 18502] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.648879 249972 task_exit.go:204] [ 18502: 18502] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.648926 249972 task_exit.go:204] [ 18502: 18502] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.649000 249972 task_signals.go:204] [ 18502: 18503] Signal 18502, PID: 18503, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.649027 249972 task_exit.go:204] [ 18502: 18503] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.650487 249972 task_exit.go:204] [ 18502: 18503] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.650537 249972 task_exit.go:204] [ 18502: 18503] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.650559 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.652076 249972 task_exit.go:204] [ 18502: 18502] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0xf, 0x0, 0x7) D0323 21:16:52.661182 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.661330 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.673066 249972 usertrap_amd64.go:212] [ 18504: 18504] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.673090 249972 usertrap_amd64.go:122] [ 18504: 18504] Allocate a new trap: 0xc0038bff20 39 D0323 21:16:52.673189 249972 usertrap_amd64.go:225] [ 18504: 18504] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.674106 249972 usertrap_amd64.go:212] [ 18504: 18504] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.674131 249972 usertrap_amd64.go:122] [ 18504: 18504] Allocate a new trap: 0xc0038bff20 40 D0323 21:16:52.674155 249972 usertrap_amd64.go:225] [ 18504: 18504] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.674947 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.675288 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.686161 249972 usertrap_amd64.go:212] [ 18504: 18504] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.686200 249972 usertrap_amd64.go:122] [ 18504: 18504] Allocate a new trap: 0xc0038bff20 41 D0323 21:16:52.686217 249972 usertrap_amd64.go:225] [ 18504: 18504] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.698070 249972 usertrap_amd64.go:212] [ 18504: 18504] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.698116 249972 usertrap_amd64.go:122] [ 18504: 18504] Allocate a new trap: 0xc0038bff20 42 D0323 21:16:52.698133 249972 usertrap_amd64.go:225] [ 18504: 18504] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.698997 249972 task_exit.go:204] [ 18504: 18504] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.699056 249972 task_exit.go:204] [ 18504: 18504] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.699384 249972 task_signals.go:204] [ 18504: 18505] Signal 18504, PID: 18505, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.699415 249972 task_exit.go:204] [ 18504: 18505] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.700859 249972 task_exit.go:204] [ 18504: 18505] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.700885 249972 task_exit.go:204] [ 18504: 18505] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.700934 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.701439 249972 task_exit.go:204] [ 18504: 18504] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: semctl$SETALL(0x0, 0x0, 0x3, &(0x7f0000000040)) D0323 21:16:52.704740 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.704917 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.729441 249972 usertrap_amd64.go:212] [ 18506: 18506] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.729485 249972 usertrap_amd64.go:122] [ 18506: 18506] Allocate a new trap: 0xc009027080 39 D0323 21:16:52.729570 249972 usertrap_amd64.go:225] [ 18506: 18506] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.730441 249972 usertrap_amd64.go:212] [ 18506: 18506] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.730479 249972 usertrap_amd64.go:122] [ 18506: 18506] Allocate a new trap: 0xc009027080 40 D0323 21:16:52.730510 249972 usertrap_amd64.go:225] [ 18506: 18506] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.731203 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.731467 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.735232 249972 usertrap_amd64.go:212] [ 18506: 18506] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.735254 249972 usertrap_amd64.go:122] [ 18506: 18506] Allocate a new trap: 0xc009027080 41 D0323 21:16:52.735267 249972 usertrap_amd64.go:225] [ 18506: 18506] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.747134 249972 usertrap_amd64.go:212] [ 18506: 18506] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.747168 249972 usertrap_amd64.go:122] [ 18506: 18506] Allocate a new trap: 0xc009027080 42 D0323 21:16:52.747184 249972 usertrap_amd64.go:225] [ 18506: 18506] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.747666 249972 task_exit.go:204] [ 18506: 18506] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.747703 249972 task_exit.go:204] [ 18506: 18506] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.747970 249972 task_signals.go:204] [ 18506: 18507] Signal 18506, PID: 18507, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.748021 249972 task_exit.go:204] [ 18506: 18507] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.749265 249972 task_exit.go:204] [ 18506: 18507] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.749294 249972 task_exit.go:204] [ 18506: 18507] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.749313 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.749768 249972 task_exit.go:204] [ 18506: 18506] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0xee54ef26e2fabe03, 0x4) D0323 21:16:52.751139 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.751293 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.760797 249972 usertrap_amd64.go:212] [ 18508: 18508] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.760836 249972 usertrap_amd64.go:122] [ 18508: 18508] Allocate a new trap: 0xc00a424840 39 D0323 21:16:52.760985 249972 usertrap_amd64.go:225] [ 18508: 18508] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.762669 249972 usertrap_amd64.go:212] [ 18508: 18508] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.762694 249972 usertrap_amd64.go:122] [ 18508: 18508] Allocate a new trap: 0xc00a424840 40 D0323 21:16:52.762705 249972 usertrap_amd64.go:225] [ 18508: 18508] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.763407 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.763610 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.766722 249972 usertrap_amd64.go:212] [ 18508: 18508] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.766742 249972 usertrap_amd64.go:122] [ 18508: 18508] Allocate a new trap: 0xc00a424840 41 D0323 21:16:52.766759 249972 usertrap_amd64.go:225] [ 18508: 18508] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.778025 249972 usertrap_amd64.go:212] [ 18508: 18508] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.778046 249972 usertrap_amd64.go:122] [ 18508: 18508] Allocate a new trap: 0xc00a424840 42 D0323 21:16:52.778059 249972 usertrap_amd64.go:225] [ 18508: 18508] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.778692 249972 task_exit.go:204] [ 18508: 18508] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.778727 249972 task_exit.go:204] [ 18508: 18508] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.778809 249972 task_signals.go:204] [ 18508: 18509] Signal 18508, PID: 18509, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.778829 249972 task_exit.go:204] [ 18508: 18509] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.781005 249972 task_exit.go:204] [ 18508: 18509] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.781039 249972 task_exit.go:204] [ 18508: 18509] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.781061 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.781144 249972 task_exit.go:204] [ 18508: 18508] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x3, &(0x7f0000000000), 0x4) D0323 21:16:52.784256 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.784386 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.792131 249972 usertrap_amd64.go:212] [ 18510: 18510] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.792162 249972 usertrap_amd64.go:122] [ 18510: 18510] Allocate a new trap: 0xc004639f80 39 D0323 21:16:52.792251 249972 usertrap_amd64.go:225] [ 18510: 18510] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.792736 249972 usertrap_amd64.go:212] [ 18510: 18510] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.792768 249972 usertrap_amd64.go:122] [ 18510: 18510] Allocate a new trap: 0xc004639f80 40 D0323 21:16:52.792780 249972 usertrap_amd64.go:225] [ 18510: 18510] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.793181 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.793399 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.798683 249972 usertrap_amd64.go:212] [ 18510: 18510] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.798711 249972 usertrap_amd64.go:122] [ 18510: 18510] Allocate a new trap: 0xc004639f80 41 D0323 21:16:52.798724 249972 usertrap_amd64.go:225] [ 18510: 18510] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.807801 249972 usertrap_amd64.go:212] [ 18510: 18510] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.807827 249972 usertrap_amd64.go:122] [ 18510: 18510] Allocate a new trap: 0xc004639f80 42 D0323 21:16:52.807842 249972 usertrap_amd64.go:225] [ 18510: 18510] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.808333 249972 task_exit.go:204] [ 18510: 18510] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.808375 249972 task_exit.go:204] [ 18510: 18510] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.808451 249972 task_signals.go:204] [ 18510: 18511] Signal 18510, PID: 18511, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.808477 249972 task_exit.go:204] [ 18510: 18511] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.810240 249972 task_exit.go:204] [ 18510: 18511] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.810274 249972 task_exit.go:204] [ 18510: 18511] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.810285 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.811282 249972 task_exit.go:204] [ 18510: 18510] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x5, &(0x7f0000000000), 0x4) D0323 21:16:52.812402 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.813055 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.823086 249972 usertrap_amd64.go:212] [ 18512: 18512] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.823113 249972 usertrap_amd64.go:122] [ 18512: 18512] Allocate a new trap: 0xc00b2f0000 39 D0323 21:16:52.823194 249972 usertrap_amd64.go:225] [ 18512: 18512] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.824329 249972 usertrap_amd64.go:212] [ 18512: 18512] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.824372 249972 usertrap_amd64.go:122] [ 18512: 18512] Allocate a new trap: 0xc00b2f0000 40 D0323 21:16:52.824389 249972 usertrap_amd64.go:225] [ 18512: 18512] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.825049 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.825265 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.828195 249972 usertrap_amd64.go:212] [ 18512: 18512] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.828219 249972 usertrap_amd64.go:122] [ 18512: 18512] Allocate a new trap: 0xc00b2f0000 41 D0323 21:16:52.828229 249972 usertrap_amd64.go:225] [ 18512: 18512] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.835228 249972 usertrap_amd64.go:212] [ 18512: 18512] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.835261 249972 usertrap_amd64.go:122] [ 18512: 18512] Allocate a new trap: 0xc00b2f0000 42 D0323 21:16:52.835276 249972 usertrap_amd64.go:225] [ 18512: 18512] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.835690 249972 task_exit.go:204] [ 18512: 18512] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.835766 249972 task_exit.go:204] [ 18512: 18512] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.835822 249972 task_signals.go:204] [ 18512: 18513] Signal 18512, PID: 18513, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.835849 249972 task_exit.go:204] [ 18512: 18513] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.837514 249972 task_exit.go:204] [ 18512: 18513] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.837535 249972 task_exit.go:204] [ 18512: 18513] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.837560 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.838362 249972 task_exit.go:204] [ 18512: 18512] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4b, 0x0, 0x0) D0323 21:16:52.856982 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.857167 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.868623 249972 usertrap_amd64.go:212] [ 18514: 18514] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.868726 249972 usertrap_amd64.go:122] [ 18514: 18514] Allocate a new trap: 0xc00a424b10 39 D0323 21:16:52.868863 249972 usertrap_amd64.go:225] [ 18514: 18514] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.869796 249972 usertrap_amd64.go:212] [ 18514: 18514] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.869824 249972 usertrap_amd64.go:122] [ 18514: 18514] Allocate a new trap: 0xc00a424b10 40 D0323 21:16:52.869838 249972 usertrap_amd64.go:225] [ 18514: 18514] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.870911 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.871137 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.875422 249972 usertrap_amd64.go:212] [ 18514: 18514] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.875510 249972 usertrap_amd64.go:122] [ 18514: 18514] Allocate a new trap: 0xc00a424b10 41 D0323 21:16:52.875554 249972 usertrap_amd64.go:225] [ 18514: 18514] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.881742 249972 usertrap_amd64.go:212] [ 18514: 18514] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.881769 249972 usertrap_amd64.go:122] [ 18514: 18514] Allocate a new trap: 0xc00a424b10 42 D0323 21:16:52.881781 249972 usertrap_amd64.go:225] [ 18514: 18514] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.882174 249972 task_exit.go:204] [ 18514: 18514] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.882205 249972 task_exit.go:204] [ 18514: 18514] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.882226 249972 task_signals.go:204] [ 18514: 18515] Signal 18514, PID: 18515, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.882260 249972 task_exit.go:204] [ 18514: 18515] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.883710 249972 task_exit.go:204] [ 18514: 18515] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.883739 249972 task_exit.go:204] [ 18514: 18515] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.883758 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.884531 249972 task_exit.go:204] [ 18514: 18514] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.886103 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.886602 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000011c0)=0x1, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x2, 0x0, &(0x7f0000000200)) D0323 21:16:52.897088 249972 usertrap_amd64.go:212] [ 18516: 18516] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.897123 249972 usertrap_amd64.go:122] [ 18516: 18516] Allocate a new trap: 0xc007c40300 39 D0323 21:16:52.897230 249972 usertrap_amd64.go:225] [ 18516: 18516] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.898601 249972 usertrap_amd64.go:212] [ 18516: 18516] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.898635 249972 usertrap_amd64.go:122] [ 18516: 18516] Allocate a new trap: 0xc007c40300 40 D0323 21:16:52.898649 249972 usertrap_amd64.go:225] [ 18516: 18516] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.899187 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.899373 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.903736 249972 usertrap_amd64.go:212] [ 18516: 18516] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.903818 249972 usertrap_amd64.go:122] [ 18516: 18516] Allocate a new trap: 0xc007c40300 41 D0323 21:16:52.903841 249972 usertrap_amd64.go:225] [ 18516: 18516] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.912166 249972 usertrap_amd64.go:212] [ 18516: 18516] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.912208 249972 usertrap_amd64.go:122] [ 18516: 18516] Allocate a new trap: 0xc007c40300 42 D0323 21:16:52.912223 249972 usertrap_amd64.go:225] [ 18516: 18516] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.912542 249972 task_exit.go:204] [ 18516: 18516] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.912712 249972 task_exit.go:204] [ 18516: 18516] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.912784 249972 task_signals.go:204] [ 18516: 18517] Signal 18516, PID: 18517, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.912829 249972 task_exit.go:204] [ 18516: 18517] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.915097 249972 task_exit.go:204] [ 18516: 18517] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.915121 249972 task_exit.go:204] [ 18516: 18517] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.915135 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.915285 249972 task_exit.go:204] [ 18516: 18516] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x107, 0xf, 0x0, 0x0) D0323 21:16:52.917450 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.917599 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.928464 249972 usertrap_amd64.go:212] [ 18518: 18518] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.928502 249972 usertrap_amd64.go:122] [ 18518: 18518] Allocate a new trap: 0xc0065af650 39 D0323 21:16:52.928619 249972 usertrap_amd64.go:225] [ 18518: 18518] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.929246 249972 usertrap_amd64.go:212] [ 18518: 18518] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.929317 249972 usertrap_amd64.go:122] [ 18518: 18518] Allocate a new trap: 0xc0065af650 40 D0323 21:16:52.929358 249972 usertrap_amd64.go:225] [ 18518: 18518] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.930927 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.931131 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.935397 249972 usertrap_amd64.go:212] [ 18518: 18518] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.935425 249972 usertrap_amd64.go:122] [ 18518: 18518] Allocate a new trap: 0xc0065af650 41 D0323 21:16:52.935436 249972 usertrap_amd64.go:225] [ 18518: 18518] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.943914 249972 usertrap_amd64.go:212] [ 18518: 18518] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.943946 249972 usertrap_amd64.go:122] [ 18518: 18518] Allocate a new trap: 0xc0065af650 42 D0323 21:16:52.943959 249972 usertrap_amd64.go:225] [ 18518: 18518] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.944448 249972 task_exit.go:204] [ 18518: 18518] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.944557 249972 task_exit.go:204] [ 18518: 18518] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.945420 249972 task_signals.go:204] [ 18518: 18519] Signal 18518, PID: 18519, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.945452 249972 task_exit.go:204] [ 18518: 18519] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.946465 249972 task_exit.go:204] [ 18518: 18519] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.946504 249972 task_exit.go:204] [ 18518: 18519] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.946520 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.946644 249972 task_exit.go:204] [ 18518: 18518] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x16, &(0x7f0000000000), 0x4) D0323 21:16:52.950157 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.950317 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.958720 249972 usertrap_amd64.go:212] [ 18520: 18520] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.958831 249972 usertrap_amd64.go:122] [ 18520: 18520] Allocate a new trap: 0xc0065af8c0 39 D0323 21:16:52.959006 249972 usertrap_amd64.go:225] [ 18520: 18520] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.959622 249972 usertrap_amd64.go:212] [ 18520: 18520] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.959650 249972 usertrap_amd64.go:122] [ 18520: 18520] Allocate a new trap: 0xc0065af8c0 40 D0323 21:16:52.959662 249972 usertrap_amd64.go:225] [ 18520: 18520] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.960507 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.960759 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.964288 249972 usertrap_amd64.go:212] [ 18520: 18520] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.964313 249972 usertrap_amd64.go:122] [ 18520: 18520] Allocate a new trap: 0xc0065af8c0 41 D0323 21:16:52.964324 249972 usertrap_amd64.go:225] [ 18520: 18520] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:52.974134 249972 usertrap_amd64.go:212] [ 18520: 18520] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:52.974178 249972 usertrap_amd64.go:122] [ 18520: 18520] Allocate a new trap: 0xc0065af8c0 42 D0323 21:16:52.974193 249972 usertrap_amd64.go:225] [ 18520: 18520] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:52.974636 249972 task_exit.go:204] [ 18520: 18520] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.974671 249972 task_exit.go:204] [ 18520: 18520] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.974692 249972 task_signals.go:204] [ 18520: 18521] Signal 18520, PID: 18521, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:52.974717 249972 task_exit.go:204] [ 18520: 18521] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:52.977126 249972 task_exit.go:204] [ 18520: 18521] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:52.977176 249972 task_exit.go:204] [ 18520: 18521] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:52.977191 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:52.978371 249972 task_exit.go:204] [ 18520: 18520] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040)=0xfaceb47c, 0x4) D0323 21:16:52.980912 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:52.981113 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.989781 249972 usertrap_amd64.go:212] [ 18522: 18522] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:52.989823 249972 usertrap_amd64.go:122] [ 18522: 18522] Allocate a new trap: 0xc007c40600 39 D0323 21:16:52.989923 249972 usertrap_amd64.go:225] [ 18522: 18522] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:52.991310 249972 usertrap_amd64.go:212] [ 18522: 18522] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:52.991354 249972 usertrap_amd64.go:122] [ 18522: 18522] Allocate a new trap: 0xc007c40600 40 D0323 21:16:52.991370 249972 usertrap_amd64.go:225] [ 18522: 18522] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:52.991755 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:52.991999 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:52.998651 249972 usertrap_amd64.go:212] [ 18522: 18522] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:52.998694 249972 usertrap_amd64.go:122] [ 18522: 18522] Allocate a new trap: 0xc007c40600 41 D0323 21:16:52.998710 249972 usertrap_amd64.go:225] [ 18522: 18522] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.005369 249972 usertrap_amd64.go:212] [ 18522: 18522] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.005457 249972 usertrap_amd64.go:122] [ 18522: 18522] Allocate a new trap: 0xc007c40600 42 D0323 21:16:53.005482 249972 usertrap_amd64.go:225] [ 18522: 18522] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.006248 249972 task_exit.go:204] [ 18522: 18522] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.006295 249972 task_exit.go:204] [ 18522: 18522] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.006405 249972 task_signals.go:204] [ 18522: 18523] Signal 18522, PID: 18523, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.006499 249972 task_exit.go:204] [ 18522: 18523] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.008143 249972 task_exit.go:204] [ 18522: 18523] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.008178 249972 task_exit.go:204] [ 18522: 18523] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.008192 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.009308 249972 task_exit.go:204] [ 18522: 18522] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: setuid(0xee01) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) setresuid(r0, 0xffffffffffffffff, 0xffffffffffffffff) D0323 21:16:53.010502 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.010671 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.018931 249972 usertrap_amd64.go:212] [ 18524: 18524] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.018953 249972 usertrap_amd64.go:122] [ 18524: 18524] Allocate a new trap: 0xc00b2f02d0 39 D0323 21:16:53.019038 249972 usertrap_amd64.go:225] [ 18524: 18524] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.019567 249972 usertrap_amd64.go:212] [ 18524: 18524] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.019583 249972 usertrap_amd64.go:122] [ 18524: 18524] Allocate a new trap: 0xc00b2f02d0 40 D0323 21:16:53.019591 249972 usertrap_amd64.go:225] [ 18524: 18524] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.020075 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.020245 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.022705 249972 usertrap_amd64.go:212] [ 18524: 18524] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.022732 249972 usertrap_amd64.go:122] [ 18524: 18524] Allocate a new trap: 0xc00b2f02d0 41 D0323 21:16:53.022741 249972 usertrap_amd64.go:225] [ 18524: 18524] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.031297 249972 usertrap_amd64.go:212] [ 18524: 18524] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.031327 249972 usertrap_amd64.go:122] [ 18524: 18524] Allocate a new trap: 0xc00b2f02d0 42 D0323 21:16:53.031339 249972 usertrap_amd64.go:225] [ 18524: 18524] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.031604 249972 task_exit.go:204] [ 18524: 18524] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.031632 249972 task_exit.go:204] [ 18524: 18524] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.031723 249972 task_signals.go:204] [ 18524: 18525] Signal 18524, PID: 18525, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.031759 249972 task_exit.go:204] [ 18524: 18525] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.033250 249972 task_exit.go:204] [ 18524: 18525] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.033286 249972 task_exit.go:204] [ 18524: 18525] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.033299 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.033791 249972 task_exit.go:204] [ 18524: 18524] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000011c0)=0x1, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) D0323 21:16:53.041533 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.041753 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.048470 249972 usertrap_amd64.go:212] [ 18526: 18526] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.048512 249972 usertrap_amd64.go:122] [ 18526: 18526] Allocate a new trap: 0xc00ab5c630 39 D0323 21:16:53.048623 249972 usertrap_amd64.go:225] [ 18526: 18526] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.049364 249972 usertrap_amd64.go:212] [ 18526: 18526] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.049396 249972 usertrap_amd64.go:122] [ 18526: 18526] Allocate a new trap: 0xc00ab5c630 40 D0323 21:16:53.049406 249972 usertrap_amd64.go:225] [ 18526: 18526] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.049814 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.050012 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.054235 249972 usertrap_amd64.go:212] [ 18526: 18526] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.054342 249972 usertrap_amd64.go:122] [ 18526: 18526] Allocate a new trap: 0xc00ab5c630 41 D0323 21:16:53.054368 249972 usertrap_amd64.go:225] [ 18526: 18526] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.070537 249972 usertrap_amd64.go:212] [ 18526: 18526] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.070574 249972 usertrap_amd64.go:122] [ 18526: 18526] Allocate a new trap: 0xc00ab5c630 42 D0323 21:16:53.070614 249972 usertrap_amd64.go:225] [ 18526: 18526] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.071094 249972 task_exit.go:204] [ 18526: 18526] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.071144 249972 task_exit.go:204] [ 18526: 18526] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.071170 249972 task_signals.go:204] [ 18526: 18527] Signal 18526, PID: 18527, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.071201 249972 task_exit.go:204] [ 18526: 18527] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.074035 249972 task_exit.go:204] [ 18526: 18527] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.074085 249972 task_exit.go:204] [ 18526: 18527] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.074106 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.075108 249972 task_exit.go:204] [ 18526: 18526] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.076587 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x11, 0x0, 0x0) D0323 21:16:53.077771 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.091138 249972 usertrap_amd64.go:212] [ 18528: 18528] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.091312 249972 usertrap_amd64.go:122] [ 18528: 18528] Allocate a new trap: 0xc00a424f60 39 D0323 21:16:53.091406 249972 usertrap_amd64.go:225] [ 18528: 18528] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.092358 249972 usertrap_amd64.go:212] [ 18528: 18528] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.092389 249972 usertrap_amd64.go:122] [ 18528: 18528] Allocate a new trap: 0xc00a424f60 40 D0323 21:16:53.092418 249972 usertrap_amd64.go:225] [ 18528: 18528] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.093444 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.093712 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.097297 249972 usertrap_amd64.go:212] [ 18528: 18528] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.097340 249972 usertrap_amd64.go:122] [ 18528: 18528] Allocate a new trap: 0xc00a424f60 41 D0323 21:16:53.097356 249972 usertrap_amd64.go:225] [ 18528: 18528] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.107507 249972 usertrap_amd64.go:212] [ 18528: 18528] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.107567 249972 usertrap_amd64.go:122] [ 18528: 18528] Allocate a new trap: 0xc00a424f60 42 D0323 21:16:53.107583 249972 usertrap_amd64.go:225] [ 18528: 18528] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.108155 249972 task_exit.go:204] [ 18528: 18528] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.108210 249972 task_exit.go:204] [ 18528: 18528] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.108281 249972 task_signals.go:204] [ 18528: 18529] Signal 18528, PID: 18529, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.108322 249972 task_exit.go:204] [ 18528: 18529] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.110031 249972 task_exit.go:204] [ 18528: 18529] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.110059 249972 task_exit.go:204] [ 18528: 18529] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.110082 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.111648 249972 task_exit.go:204] [ 18528: 18528] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) D0323 21:16:53.113194 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.113362 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.126386 249972 usertrap_amd64.go:212] [ 18530: 18530] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.126427 249972 usertrap_amd64.go:122] [ 18530: 18530] Allocate a new trap: 0xc00b2f0420 39 D0323 21:16:53.126508 249972 usertrap_amd64.go:225] [ 18530: 18530] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.126904 249972 usertrap_amd64.go:212] [ 18530: 18530] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.126931 249972 usertrap_amd64.go:122] [ 18530: 18530] Allocate a new trap: 0xc00b2f0420 40 D0323 21:16:53.126939 249972 usertrap_amd64.go:225] [ 18530: 18530] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.127284 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.127495 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.130283 249972 usertrap_amd64.go:212] [ 18530: 18530] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.130371 249972 usertrap_amd64.go:122] [ 18530: 18530] Allocate a new trap: 0xc00b2f0420 41 D0323 21:16:53.130386 249972 usertrap_amd64.go:225] [ 18530: 18530] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.136520 249972 usertrap_amd64.go:212] [ 18530: 18530] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.136584 249972 usertrap_amd64.go:122] [ 18530: 18530] Allocate a new trap: 0xc00b2f0420 42 D0323 21:16:53.136608 249972 usertrap_amd64.go:225] [ 18530: 18530] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.137035 249972 task_exit.go:204] [ 18530: 18530] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.137081 249972 task_exit.go:204] [ 18530: 18530] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.137171 249972 task_signals.go:204] [ 18530: 18531] Signal 18530, PID: 18531, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.137206 249972 task_exit.go:204] [ 18530: 18531] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.138492 249972 task_exit.go:204] [ 18530: 18531] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.138533 249972 task_exit.go:204] [ 18530: 18531] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.138551 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.139182 249972 task_exit.go:204] [ 18530: 18530] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4c, 0x0, 0x0) D0323 21:16:53.140741 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.140894 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.149546 249972 usertrap_amd64.go:212] [ 18532: 18532] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.149585 249972 usertrap_amd64.go:122] [ 18532: 18532] Allocate a new trap: 0xc00b2f0630 39 D0323 21:16:53.149667 249972 usertrap_amd64.go:225] [ 18532: 18532] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.150150 249972 usertrap_amd64.go:212] [ 18532: 18532] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.150171 249972 usertrap_amd64.go:122] [ 18532: 18532] Allocate a new trap: 0xc00b2f0630 40 D0323 21:16:53.150181 249972 usertrap_amd64.go:225] [ 18532: 18532] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.151334 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.151550 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.154312 249972 usertrap_amd64.go:212] [ 18532: 18532] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.154328 249972 usertrap_amd64.go:122] [ 18532: 18532] Allocate a new trap: 0xc00b2f0630 41 D0323 21:16:53.154340 249972 usertrap_amd64.go:225] [ 18532: 18532] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.162657 249972 usertrap_amd64.go:212] [ 18532: 18532] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.162720 249972 usertrap_amd64.go:122] [ 18532: 18532] Allocate a new trap: 0xc00b2f0630 42 D0323 21:16:53.162736 249972 usertrap_amd64.go:225] [ 18532: 18532] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.163480 249972 task_exit.go:204] [ 18532: 18532] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.163617 249972 task_exit.go:204] [ 18532: 18532] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.163701 249972 task_signals.go:204] [ 18532: 18533] Signal 18532, PID: 18533, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.163795 249972 task_exit.go:204] [ 18532: 18533] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.165178 249972 task_exit.go:204] [ 18532: 18533] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.165211 249972 task_exit.go:204] [ 18532: 18533] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.165251 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.167222 249972 task_exit.go:204] [ 18532: 18532] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) D0323 21:16:53.168251 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.168465 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.177919 249972 usertrap_amd64.go:212] [ 18534: 18534] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.178002 249972 usertrap_amd64.go:122] [ 18534: 18534] Allocate a new trap: 0xc0090272c0 39 D0323 21:16:53.178092 249972 usertrap_amd64.go:225] [ 18534: 18534] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.178757 249972 usertrap_amd64.go:212] [ 18534: 18534] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.178813 249972 usertrap_amd64.go:122] [ 18534: 18534] Allocate a new trap: 0xc0090272c0 40 D0323 21:16:53.178829 249972 usertrap_amd64.go:225] [ 18534: 18534] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.179310 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.179479 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.182630 249972 usertrap_amd64.go:212] [ 18534: 18534] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.182655 249972 usertrap_amd64.go:122] [ 18534: 18534] Allocate a new trap: 0xc0090272c0 41 D0323 21:16:53.182665 249972 usertrap_amd64.go:225] [ 18534: 18534] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.189078 249972 usertrap_amd64.go:212] [ 18534: 18534] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.189105 249972 usertrap_amd64.go:122] [ 18534: 18534] Allocate a new trap: 0xc0090272c0 42 D0323 21:16:53.189126 249972 usertrap_amd64.go:225] [ 18534: 18534] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.189466 249972 task_exit.go:204] [ 18534: 18534] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.189488 249972 task_exit.go:204] [ 18534: 18534] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.189502 249972 task_signals.go:204] [ 18534: 18535] Signal 18534, PID: 18535, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.189524 249972 task_exit.go:204] [ 18534: 18535] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.190894 249972 task_exit.go:204] [ 18534: 18535] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.190930 249972 task_exit.go:204] [ 18534: 18535] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.190947 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.191843 249972 task_exit.go:204] [ 18534: 18534] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x5, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6}]}) D0323 21:16:53.194031 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.194235 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.204502 249972 usertrap_amd64.go:212] [ 18536: 18536] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.204529 249972 usertrap_amd64.go:122] [ 18536: 18536] Allocate a new trap: 0xc009027380 39 D0323 21:16:53.204597 249972 usertrap_amd64.go:225] [ 18536: 18536] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.205006 249972 usertrap_amd64.go:212] [ 18536: 18536] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.205024 249972 usertrap_amd64.go:122] [ 18536: 18536] Allocate a new trap: 0xc009027380 40 D0323 21:16:53.205030 249972 usertrap_amd64.go:225] [ 18536: 18536] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.205410 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.205581 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.208404 249972 usertrap_amd64.go:212] [ 18536: 18536] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.208432 249972 usertrap_amd64.go:122] [ 18536: 18536] Allocate a new trap: 0xc009027380 41 D0323 21:16:53.208442 249972 usertrap_amd64.go:225] [ 18536: 18536] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.217854 249972 usertrap_amd64.go:212] [ 18536: 18536] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.217883 249972 usertrap_amd64.go:122] [ 18536: 18536] Allocate a new trap: 0xc009027380 42 D0323 21:16:53.217894 249972 usertrap_amd64.go:225] [ 18536: 18536] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.218269 249972 task_exit.go:204] [ 18536: 18536] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.218305 249972 task_exit.go:204] [ 18536: 18536] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.218410 249972 task_signals.go:204] [ 18536: 18537] Signal 18536, PID: 18537, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.218448 249972 task_exit.go:204] [ 18536: 18537] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.221904 249972 task_exit.go:204] [ 18536: 18537] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.221931 249972 task_exit.go:204] [ 18536: 18537] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.221945 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.222793 249972 task_exit.go:204] [ 18536: 18536] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x18, &(0x7f0000000000), 0x4) D0323 21:16:53.227347 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.227534 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.243671 249972 usertrap_amd64.go:212] [ 18538: 18538] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.243717 249972 usertrap_amd64.go:122] [ 18538: 18538] Allocate a new trap: 0xc00b2f0780 39 D0323 21:16:53.243847 249972 usertrap_amd64.go:225] [ 18538: 18538] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.244434 249972 usertrap_amd64.go:212] [ 18538: 18538] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.244468 249972 usertrap_amd64.go:122] [ 18538: 18538] Allocate a new trap: 0xc00b2f0780 40 D0323 21:16:53.244484 249972 usertrap_amd64.go:225] [ 18538: 18538] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.245303 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.245803 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.248095 249972 usertrap_amd64.go:212] [ 18538: 18538] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.248123 249972 usertrap_amd64.go:122] [ 18538: 18538] Allocate a new trap: 0xc00b2f0780 41 D0323 21:16:53.248137 249972 usertrap_amd64.go:225] [ 18538: 18538] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.254560 249972 usertrap_amd64.go:212] [ 18538: 18538] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.254612 249972 usertrap_amd64.go:122] [ 18538: 18538] Allocate a new trap: 0xc00b2f0780 42 D0323 21:16:53.254628 249972 usertrap_amd64.go:225] [ 18538: 18538] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.254963 249972 task_exit.go:204] [ 18538: 18538] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.255004 249972 task_exit.go:204] [ 18538: 18538] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.255100 249972 task_signals.go:204] [ 18538: 18539] Signal 18538, PID: 18539, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.255131 249972 task_exit.go:204] [ 18538: 18539] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.256524 249972 task_exit.go:204] [ 18538: 18539] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.256565 249972 task_exit.go:204] [ 18538: 18539] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.256588 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.257756 249972 task_exit.go:204] [ 18538: 18538] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1d, &(0x7f0000000000), 0x4) D0323 21:16:53.258739 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.258957 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.268027 249972 usertrap_amd64.go:212] [ 18540: 18540] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.268068 249972 usertrap_amd64.go:122] [ 18540: 18540] Allocate a new trap: 0xc00b2f09f0 39 D0323 21:16:53.268179 249972 usertrap_amd64.go:225] [ 18540: 18540] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.269856 249972 usertrap_amd64.go:212] [ 18540: 18540] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.269873 249972 usertrap_amd64.go:122] [ 18540: 18540] Allocate a new trap: 0xc00b2f09f0 40 D0323 21:16:53.269883 249972 usertrap_amd64.go:225] [ 18540: 18540] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.270462 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.270729 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.273984 249972 usertrap_amd64.go:212] [ 18540: 18540] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.274011 249972 usertrap_amd64.go:122] [ 18540: 18540] Allocate a new trap: 0xc00b2f09f0 41 D0323 21:16:53.274024 249972 usertrap_amd64.go:225] [ 18540: 18540] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.280217 249972 usertrap_amd64.go:212] [ 18540: 18540] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.280251 249972 usertrap_amd64.go:122] [ 18540: 18540] Allocate a new trap: 0xc00b2f09f0 42 D0323 21:16:53.280264 249972 usertrap_amd64.go:225] [ 18540: 18540] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.280519 249972 task_exit.go:204] [ 18540: 18540] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.280563 249972 task_exit.go:204] [ 18540: 18540] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.280643 249972 task_signals.go:204] [ 18540: 18541] Signal 18540, PID: 18541, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.280674 249972 task_exit.go:204] [ 18540: 18541] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.282391 249972 task_exit.go:204] [ 18540: 18541] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.282460 249972 task_exit.go:204] [ 18540: 18541] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.282479 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.283675 249972 task_exit.go:204] [ 18540: 18540] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='/dev/loop-control\x00', 0xfffffffffffffffb) D0323 21:16:53.293345 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.293508 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.310718 249972 usertrap_amd64.go:212] [ 18542: 18542] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.310767 249972 usertrap_amd64.go:122] [ 18542: 18542] Allocate a new trap: 0xc00b2f0ab0 39 D0323 21:16:53.310828 249972 usertrap_amd64.go:225] [ 18542: 18542] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.311515 249972 usertrap_amd64.go:212] [ 18542: 18542] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.311543 249972 usertrap_amd64.go:122] [ 18542: 18542] Allocate a new trap: 0xc00b2f0ab0 40 D0323 21:16:53.311556 249972 usertrap_amd64.go:225] [ 18542: 18542] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.311877 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.312493 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.315748 249972 usertrap_amd64.go:212] [ 18542: 18542] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.315773 249972 usertrap_amd64.go:122] [ 18542: 18542] Allocate a new trap: 0xc00b2f0ab0 41 D0323 21:16:53.315789 249972 usertrap_amd64.go:225] [ 18542: 18542] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.322445 249972 usertrap_amd64.go:212] [ 18542: 18542] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.322475 249972 usertrap_amd64.go:122] [ 18542: 18542] Allocate a new trap: 0xc00b2f0ab0 42 D0323 21:16:53.322489 249972 usertrap_amd64.go:225] [ 18542: 18542] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.323141 249972 task_exit.go:204] [ 18542: 18542] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.323181 249972 task_exit.go:204] [ 18542: 18542] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.323233 249972 task_signals.go:204] [ 18542: 18543] Signal 18542, PID: 18543, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.323297 249972 task_exit.go:204] [ 18542: 18543] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.325181 249972 task_exit.go:204] [ 18542: 18543] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.325211 249972 task_exit.go:204] [ 18542: 18543] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.325232 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.327214 249972 task_exit.go:204] [ 18542: 18542] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.328114 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.328301 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000001c40)={0x0, 0x2710}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='\"', 0x1}], 0x1}}], 0x1, 0x0) D0323 21:16:53.336285 249972 usertrap_amd64.go:212] [ 18544: 18544] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.336317 249972 usertrap_amd64.go:122] [ 18544: 18544] Allocate a new trap: 0xc0090275f0 39 D0323 21:16:53.336451 249972 usertrap_amd64.go:225] [ 18544: 18544] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.337193 249972 usertrap_amd64.go:212] [ 18544: 18544] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.337218 249972 usertrap_amd64.go:122] [ 18544: 18544] Allocate a new trap: 0xc0090275f0 40 D0323 21:16:53.337228 249972 usertrap_amd64.go:225] [ 18544: 18544] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.337647 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.337790 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.340714 249972 usertrap_amd64.go:212] [ 18544: 18544] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.340742 249972 usertrap_amd64.go:122] [ 18544: 18544] Allocate a new trap: 0xc0090275f0 41 D0323 21:16:53.340754 249972 usertrap_amd64.go:225] [ 18544: 18544] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.351018 249972 usertrap_amd64.go:212] [ 18544: 18544] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.351043 249972 usertrap_amd64.go:122] [ 18544: 18544] Allocate a new trap: 0xc0090275f0 42 D0323 21:16:53.351063 249972 usertrap_amd64.go:225] [ 18544: 18544] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.351380 249972 task_exit.go:204] [ 18544: 18544] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.351413 249972 task_exit.go:204] [ 18544: 18544] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.351466 249972 task_signals.go:204] [ 18544: 18545] Signal 18544, PID: 18545, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.351513 249972 task_exit.go:204] [ 18544: 18545] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.352846 249972 task_exit.go:204] [ 18544: 18545] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.352883 249972 task_exit.go:204] [ 18544: 18545] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.352903 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.353894 249972 task_exit.go:204] [ 18544: 18544] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010102, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) D0323 21:16:53.354793 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.354945 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.367223 249972 usertrap_amd64.go:212] [ 18546: 18546] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.367261 249972 usertrap_amd64.go:122] [ 18546: 18546] Allocate a new trap: 0xc009027860 39 D0323 21:16:53.367366 249972 usertrap_amd64.go:225] [ 18546: 18546] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.368057 249972 usertrap_amd64.go:212] [ 18546: 18546] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.368092 249972 usertrap_amd64.go:122] [ 18546: 18546] Allocate a new trap: 0xc009027860 40 D0323 21:16:53.368103 249972 usertrap_amd64.go:225] [ 18546: 18546] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.368724 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.368957 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.372033 249972 usertrap_amd64.go:212] [ 18546: 18546] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.372064 249972 usertrap_amd64.go:122] [ 18546: 18546] Allocate a new trap: 0xc009027860 41 D0323 21:16:53.372075 249972 usertrap_amd64.go:225] [ 18546: 18546] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.377267 249972 usertrap_amd64.go:212] [ 18546: 18547] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:53.377300 249972 usertrap_amd64.go:122] [ 18546: 18547] Allocate a new trap: 0xc009027860 42 D0323 21:16:53.377313 249972 usertrap_amd64.go:225] [ 18546: 18547] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.379394 249972 usertrap_amd64.go:212] [ 18546: 18546] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.379419 249972 usertrap_amd64.go:122] [ 18546: 18546] Allocate a new trap: 0xc009027860 43 D0323 21:16:53.379429 249972 usertrap_amd64.go:225] [ 18546: 18546] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.379545 249972 task_exit.go:204] [ 18546: 18546] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.379583 249972 task_exit.go:204] [ 18546: 18546] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.379644 249972 task_signals.go:204] [ 18546: 18547] Signal 18546, PID: 18547, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.379690 249972 task_exit.go:204] [ 18546: 18547] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.381197 249972 task_exit.go:204] [ 18546: 18547] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.381302 249972 task_exit.go:204] [ 18546: 18547] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.381355 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.381673 249972 task_exit.go:204] [ 18546: 18546] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x5}) D0323 21:16:53.384811 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.384979 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.392927 249972 usertrap_amd64.go:212] [ 18548: 18548] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.392992 249972 usertrap_amd64.go:122] [ 18548: 18548] Allocate a new trap: 0xc007c40a20 39 D0323 21:16:53.393087 249972 usertrap_amd64.go:225] [ 18548: 18548] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.393517 249972 usertrap_amd64.go:212] [ 18548: 18548] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.393540 249972 usertrap_amd64.go:122] [ 18548: 18548] Allocate a new trap: 0xc007c40a20 40 D0323 21:16:53.393550 249972 usertrap_amd64.go:225] [ 18548: 18548] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.394019 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.394210 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.396537 249972 usertrap_amd64.go:212] [ 18548: 18548] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.396557 249972 usertrap_amd64.go:122] [ 18548: 18548] Allocate a new trap: 0xc007c40a20 41 D0323 21:16:53.396566 249972 usertrap_amd64.go:225] [ 18548: 18548] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.405729 249972 usertrap_amd64.go:212] [ 18548: 18548] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.405758 249972 usertrap_amd64.go:122] [ 18548: 18548] Allocate a new trap: 0xc007c40a20 42 D0323 21:16:53.405771 249972 usertrap_amd64.go:225] [ 18548: 18548] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.406096 249972 task_exit.go:204] [ 18548: 18548] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.406132 249972 task_exit.go:204] [ 18548: 18548] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.406206 249972 task_signals.go:204] [ 18548: 18549] Signal 18548, PID: 18549, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.406245 249972 task_exit.go:204] [ 18548: 18549] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.407412 249972 task_exit.go:204] [ 18548: 18549] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.407448 249972 task_exit.go:204] [ 18548: 18549] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.407467 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.408464 249972 task_exit.go:204] [ 18548: 18548] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000001c40)={0x0, 0x2710}, 0x10) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='\"', 0x1}], 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) D0323 21:16:53.409555 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.409689 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.422849 249972 usertrap_amd64.go:212] [ 18550: 18550] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.422878 249972 usertrap_amd64.go:122] [ 18550: 18550] Allocate a new trap: 0xc009027a10 39 D0323 21:16:53.423003 249972 usertrap_amd64.go:225] [ 18550: 18550] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.423773 249972 usertrap_amd64.go:212] [ 18550: 18550] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.423800 249972 usertrap_amd64.go:122] [ 18550: 18550] Allocate a new trap: 0xc009027a10 40 D0323 21:16:53.423815 249972 usertrap_amd64.go:225] [ 18550: 18550] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.425153 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.425425 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.428315 249972 usertrap_amd64.go:212] [ 18550: 18550] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.428343 249972 usertrap_amd64.go:122] [ 18550: 18550] Allocate a new trap: 0xc009027a10 41 D0323 21:16:53.428356 249972 usertrap_amd64.go:225] [ 18550: 18550] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.440808 249972 usertrap_amd64.go:212] [ 18550: 18550] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.440836 249972 usertrap_amd64.go:122] [ 18550: 18550] Allocate a new trap: 0xc009027a10 42 D0323 21:16:53.440846 249972 usertrap_amd64.go:225] [ 18550: 18550] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.441208 249972 task_exit.go:204] [ 18550: 18550] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.441248 249972 task_exit.go:204] [ 18550: 18550] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.441288 249972 task_signals.go:204] [ 18550: 18551] Signal 18550, PID: 18551, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.441317 249972 task_exit.go:204] [ 18550: 18551] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.442915 249972 task_exit.go:204] [ 18550: 18551] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.442944 249972 task_exit.go:204] [ 18550: 18551] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.442955 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.444025 249972 task_exit.go:204] [ 18550: 18550] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000540)) D0323 21:16:53.445442 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.445633 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.453943 249972 usertrap_amd64.go:212] [ 18552: 18552] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.453976 249972 usertrap_amd64.go:122] [ 18552: 18552] Allocate a new trap: 0xc00ab5cf00 39 D0323 21:16:53.454072 249972 usertrap_amd64.go:225] [ 18552: 18552] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.454715 249972 usertrap_amd64.go:212] [ 18552: 18552] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.454745 249972 usertrap_amd64.go:122] [ 18552: 18552] Allocate a new trap: 0xc00ab5cf00 40 D0323 21:16:53.454756 249972 usertrap_amd64.go:225] [ 18552: 18552] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.455510 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.455850 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.459284 249972 usertrap_amd64.go:212] [ 18552: 18552] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.459315 249972 usertrap_amd64.go:122] [ 18552: 18552] Allocate a new trap: 0xc00ab5cf00 41 D0323 21:16:53.459328 249972 usertrap_amd64.go:225] [ 18552: 18552] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.465728 249972 usertrap_amd64.go:212] [ 18552: 18552] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.465771 249972 usertrap_amd64.go:122] [ 18552: 18552] Allocate a new trap: 0xc00ab5cf00 42 D0323 21:16:53.465783 249972 usertrap_amd64.go:225] [ 18552: 18552] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.466353 249972 task_exit.go:204] [ 18552: 18552] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.466380 249972 task_exit.go:204] [ 18552: 18552] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.466469 249972 task_signals.go:204] [ 18552: 18553] Signal 18552, PID: 18553, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.466502 249972 task_exit.go:204] [ 18552: 18553] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.467838 249972 task_exit.go:204] [ 18552: 18553] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.467880 249972 task_exit.go:204] [ 18552: 18553] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.467902 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.468404 249972 task_exit.go:204] [ 18552: 18552] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.469913 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.470012 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="e5", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000a00)="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", 0x1a1}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf6b0c618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x12, 0x0, 0x27) D0323 21:16:53.479305 249972 usertrap_amd64.go:212] [ 18554: 18554] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.479336 249972 usertrap_amd64.go:122] [ 18554: 18554] Allocate a new trap: 0xc0065afe00 39 D0323 21:16:53.479420 249972 usertrap_amd64.go:225] [ 18554: 18554] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.480175 249972 usertrap_amd64.go:212] [ 18554: 18554] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.480204 249972 usertrap_amd64.go:122] [ 18554: 18554] Allocate a new trap: 0xc0065afe00 40 D0323 21:16:53.480215 249972 usertrap_amd64.go:225] [ 18554: 18554] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.481124 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.481328 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.485608 249972 usertrap_amd64.go:212] [ 18554: 18554] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.485623 249972 usertrap_amd64.go:122] [ 18554: 18554] Allocate a new trap: 0xc0065afe00 41 D0323 21:16:53.485643 249972 usertrap_amd64.go:225] [ 18554: 18554] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.497220 249972 usertrap_amd64.go:212] [ 18554: 18554] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.497251 249972 usertrap_amd64.go:122] [ 18554: 18554] Allocate a new trap: 0xc0065afe00 42 D0323 21:16:53.497260 249972 usertrap_amd64.go:225] [ 18554: 18554] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.497560 249972 task_exit.go:204] [ 18554: 18554] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.497600 249972 task_exit.go:204] [ 18554: 18554] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.497598 249972 task_signals.go:204] [ 18554: 18555] Signal 18554, PID: 18555, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.497619 249972 task_exit.go:204] [ 18554: 18555] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.499289 249972 task_exit.go:204] [ 18554: 18555] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.499318 249972 task_exit.go:204] [ 18554: 18555] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.499330 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.500249 249972 task_exit.go:204] [ 18554: 18554] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @empty}, 0x23) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000004080), 0x4) D0323 21:16:53.504428 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.505496 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.513375 249972 usertrap_amd64.go:212] [ 18556: 18556] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.513404 249972 usertrap_amd64.go:122] [ 18556: 18556] Allocate a new trap: 0xc007c40b10 39 D0323 21:16:53.513487 249972 usertrap_amd64.go:225] [ 18556: 18556] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.513838 249972 usertrap_amd64.go:212] [ 18556: 18556] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.513861 249972 usertrap_amd64.go:122] [ 18556: 18556] Allocate a new trap: 0xc007c40b10 40 D0323 21:16:53.513871 249972 usertrap_amd64.go:225] [ 18556: 18556] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.514649 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.514865 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.517491 249972 usertrap_amd64.go:212] [ 18556: 18556] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.517520 249972 usertrap_amd64.go:122] [ 18556: 18556] Allocate a new trap: 0xc007c40b10 41 D0323 21:16:53.517533 249972 usertrap_amd64.go:225] [ 18556: 18556] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.525936 249972 usertrap_amd64.go:212] [ 18556: 18556] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.525964 249972 usertrap_amd64.go:122] [ 18556: 18556] Allocate a new trap: 0xc007c40b10 42 D0323 21:16:53.525975 249972 usertrap_amd64.go:225] [ 18556: 18556] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.526350 249972 task_exit.go:204] [ 18556: 18556] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.526445 249972 task_exit.go:204] [ 18556: 18556] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.527208 249972 task_signals.go:204] [ 18556: 18557] Signal 18556, PID: 18557, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.527316 249972 task_exit.go:204] [ 18556: 18557] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.528583 249972 task_exit.go:204] [ 18556: 18557] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.528620 249972 task_exit.go:204] [ 18556: 18557] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.528633 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.529892 249972 task_exit.go:204] [ 18556: 18556] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.530548 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.530713 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:53 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x8864, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) D0323 21:16:53.544494 249972 usertrap_amd64.go:212] [ 18558: 18558] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.544529 249972 usertrap_amd64.go:122] [ 18558: 18558] Allocate a new trap: 0xc007c40c60 39 D0323 21:16:53.544611 249972 usertrap_amd64.go:225] [ 18558: 18558] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.545274 249972 usertrap_amd64.go:212] [ 18558: 18558] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.545307 249972 usertrap_amd64.go:122] [ 18558: 18558] Allocate a new trap: 0xc007c40c60 40 D0323 21:16:53.545318 249972 usertrap_amd64.go:225] [ 18558: 18558] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.545865 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.546126 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.549227 249972 usertrap_amd64.go:212] [ 18558: 18558] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.549242 249972 usertrap_amd64.go:122] [ 18558: 18558] Allocate a new trap: 0xc007c40c60 41 D0323 21:16:53.549251 249972 usertrap_amd64.go:225] [ 18558: 18558] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.555147 249972 usertrap_amd64.go:212] [ 18558: 18559] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:53.555257 249972 usertrap_amd64.go:122] [ 18558: 18559] Allocate a new trap: 0xc007c40c60 42 D0323 21:16:53.555283 249972 usertrap_amd64.go:225] [ 18558: 18559] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.557271 249972 usertrap_amd64.go:212] [ 18558: 18558] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.557300 249972 usertrap_amd64.go:122] [ 18558: 18558] Allocate a new trap: 0xc007c40c60 43 D0323 21:16:53.557320 249972 usertrap_amd64.go:225] [ 18558: 18558] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.557437 249972 task_exit.go:204] [ 18558: 18558] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.557474 249972 task_exit.go:204] [ 18558: 18558] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.557622 249972 task_signals.go:204] [ 18558: 18559] Signal 18558, PID: 18559, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.557707 249972 task_exit.go:204] [ 18558: 18559] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.559023 249972 task_exit.go:204] [ 18558: 18559] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.559050 249972 task_exit.go:204] [ 18558: 18559] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.559068 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.559566 249972 task_exit.go:204] [ 18558: 18558] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'veth0_to_batadv\x00'}, 0x18) D0323 21:16:53.561932 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.562111 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.571256 249972 usertrap_amd64.go:212] [ 18560: 18560] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.571287 249972 usertrap_amd64.go:122] [ 18560: 18560] Allocate a new trap: 0xc007c40cc0 39 D0323 21:16:53.571356 249972 usertrap_amd64.go:225] [ 18560: 18560] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.571967 249972 usertrap_amd64.go:212] [ 18560: 18560] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.571989 249972 usertrap_amd64.go:122] [ 18560: 18560] Allocate a new trap: 0xc007c40cc0 40 D0323 21:16:53.572001 249972 usertrap_amd64.go:225] [ 18560: 18560] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.573131 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.573367 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.576161 249972 usertrap_amd64.go:212] [ 18560: 18560] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.576188 249972 usertrap_amd64.go:122] [ 18560: 18560] Allocate a new trap: 0xc007c40cc0 41 D0323 21:16:53.576203 249972 usertrap_amd64.go:225] [ 18560: 18560] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.582680 249972 usertrap_amd64.go:212] [ 18560: 18560] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.582710 249972 usertrap_amd64.go:122] [ 18560: 18560] Allocate a new trap: 0xc007c40cc0 42 D0323 21:16:53.582722 249972 usertrap_amd64.go:225] [ 18560: 18560] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.583040 249972 task_exit.go:204] [ 18560: 18560] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.583097 249972 task_exit.go:204] [ 18560: 18560] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.583163 249972 task_signals.go:204] [ 18560: 18561] Signal 18560, PID: 18561, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.583195 249972 task_exit.go:204] [ 18560: 18561] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.584855 249972 task_exit.go:204] [ 18560: 18561] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.584888 249972 task_exit.go:204] [ 18560: 18561] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.584903 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.585528 249972 task_exit.go:204] [ 18560: 18560] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: syz_emit_ethernet(0xd2, &(0x7f00000024c0)={@broadcast, @local, @val, {@ipv6}}, 0x0) D0323 21:16:53.589830 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.589998 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.597840 249972 usertrap_amd64.go:212] [ 18562: 18562] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.597890 249972 usertrap_amd64.go:122] [ 18562: 18562] Allocate a new trap: 0xc007ae0780 39 D0323 21:16:53.597984 249972 usertrap_amd64.go:225] [ 18562: 18562] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.598631 249972 usertrap_amd64.go:212] [ 18562: 18562] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.598657 249972 usertrap_amd64.go:122] [ 18562: 18562] Allocate a new trap: 0xc007ae0780 40 D0323 21:16:53.598668 249972 usertrap_amd64.go:225] [ 18562: 18562] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.599294 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.599938 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.607078 249972 usertrap_amd64.go:212] [ 18562: 18562] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.607111 249972 usertrap_amd64.go:122] [ 18562: 18562] Allocate a new trap: 0xc007ae0780 41 D0323 21:16:53.607127 249972 usertrap_amd64.go:225] [ 18562: 18562] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.613699 249972 usertrap_amd64.go:212] [ 18562: 18563] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:53.613734 249972 usertrap_amd64.go:122] [ 18562: 18563] Allocate a new trap: 0xc007ae0780 42 D0323 21:16:53.613746 249972 usertrap_amd64.go:225] [ 18562: 18563] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.615536 249972 usertrap_amd64.go:212] [ 18562: 18562] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.615571 249972 usertrap_amd64.go:122] [ 18562: 18562] Allocate a new trap: 0xc007ae0780 43 D0323 21:16:53.615583 249972 usertrap_amd64.go:225] [ 18562: 18562] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.615667 249972 task_exit.go:204] [ 18562: 18562] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.615706 249972 task_exit.go:204] [ 18562: 18562] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.615776 249972 task_signals.go:204] [ 18562: 18563] Signal 18562, PID: 18563, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.615807 249972 task_exit.go:204] [ 18562: 18563] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.617314 249972 task_exit.go:204] [ 18562: 18563] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.617413 249972 task_exit.go:204] [ 18562: 18563] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.617495 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.618449 249972 task_exit.go:204] [ 18562: 18562] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0), 0x108) D0323 21:16:53.620233 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.620396 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.628762 249972 usertrap_amd64.go:212] [ 18564: 18564] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.628831 249972 usertrap_amd64.go:122] [ 18564: 18564] Allocate a new trap: 0xc0087be180 39 D0323 21:16:53.628929 249972 usertrap_amd64.go:225] [ 18564: 18564] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.629486 249972 usertrap_amd64.go:212] [ 18564: 18564] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.629508 249972 usertrap_amd64.go:122] [ 18564: 18564] Allocate a new trap: 0xc0087be180 40 D0323 21:16:53.629517 249972 usertrap_amd64.go:225] [ 18564: 18564] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.629881 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.631505 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.634190 249972 usertrap_amd64.go:212] [ 18564: 18564] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.634225 249972 usertrap_amd64.go:122] [ 18564: 18564] Allocate a new trap: 0xc0087be180 41 D0323 21:16:53.634237 249972 usertrap_amd64.go:225] [ 18564: 18564] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.640646 249972 usertrap_amd64.go:212] [ 18564: 18564] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.640684 249972 usertrap_amd64.go:122] [ 18564: 18564] Allocate a new trap: 0xc0087be180 42 D0323 21:16:53.640694 249972 usertrap_amd64.go:225] [ 18564: 18564] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.641016 249972 task_exit.go:204] [ 18564: 18564] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.641047 249972 task_exit.go:204] [ 18564: 18564] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.641082 249972 task_signals.go:204] [ 18564: 18565] Signal 18564, PID: 18565, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.641134 249972 task_exit.go:204] [ 18564: 18565] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.642584 249972 task_exit.go:204] [ 18564: 18565] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.642601 249972 task_exit.go:204] [ 18564: 18565] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.642619 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.643164 249972 task_exit.go:204] [ 18564: 18564] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.643884 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.644009 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:53 executing program 0: mount(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) D0323 21:16:53.653010 249972 usertrap_amd64.go:212] [ 18566: 18566] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.653087 249972 usertrap_amd64.go:122] [ 18566: 18566] Allocate a new trap: 0xc007c40e70 39 D0323 21:16:53.653168 249972 usertrap_amd64.go:225] [ 18566: 18566] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.653738 249972 usertrap_amd64.go:212] [ 18566: 18566] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.653796 249972 usertrap_amd64.go:122] [ 18566: 18566] Allocate a new trap: 0xc007c40e70 40 D0323 21:16:53.653811 249972 usertrap_amd64.go:225] [ 18566: 18566] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.654369 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.654567 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.657205 249972 usertrap_amd64.go:212] [ 18566: 18566] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.657236 249972 usertrap_amd64.go:122] [ 18566: 18566] Allocate a new trap: 0xc007c40e70 41 D0323 21:16:53.657247 249972 usertrap_amd64.go:225] [ 18566: 18566] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.662135 249972 usertrap_amd64.go:212] [ 18566: 18566] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.662162 249972 usertrap_amd64.go:122] [ 18566: 18566] Allocate a new trap: 0xc007c40e70 42 D0323 21:16:53.662174 249972 usertrap_amd64.go:225] [ 18566: 18566] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.662474 249972 task_exit.go:204] [ 18566: 18566] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.662508 249972 task_exit.go:204] [ 18566: 18566] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.662507 249972 task_signals.go:204] [ 18566: 18567] Signal 18566, PID: 18567, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.662528 249972 task_exit.go:204] [ 18566: 18567] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.663899 249972 task_exit.go:204] [ 18566: 18567] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.663976 249972 task_exit.go:204] [ 18566: 18567] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.663995 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.664054 249972 task_exit.go:204] [ 18566: 18566] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) poll(&(0x7f0000001bc0)=[{r0}], 0x1, 0x4) D0323 21:16:53.665537 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.665684 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.672918 249972 usertrap_amd64.go:212] [ 18568: 18568] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.673031 249972 usertrap_amd64.go:122] [ 18568: 18568] Allocate a new trap: 0xc00ab5d740 39 D0323 21:16:53.673161 249972 usertrap_amd64.go:225] [ 18568: 18568] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.673864 249972 usertrap_amd64.go:212] [ 18568: 18568] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.673890 249972 usertrap_amd64.go:122] [ 18568: 18568] Allocate a new trap: 0xc00ab5d740 40 D0323 21:16:53.673902 249972 usertrap_amd64.go:225] [ 18568: 18568] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.674433 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.674635 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.677536 249972 usertrap_amd64.go:212] [ 18568: 18568] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.677567 249972 usertrap_amd64.go:122] [ 18568: 18568] Allocate a new trap: 0xc00ab5d740 41 D0323 21:16:53.677587 249972 usertrap_amd64.go:225] [ 18568: 18568] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.688689 249972 usertrap_amd64.go:212] [ 18568: 18568] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.688716 249972 usertrap_amd64.go:122] [ 18568: 18568] Allocate a new trap: 0xc00ab5d740 42 D0323 21:16:53.688725 249972 usertrap_amd64.go:225] [ 18568: 18568] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.689035 249972 task_exit.go:204] [ 18568: 18568] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.689059 249972 task_exit.go:204] [ 18568: 18568] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.689126 249972 task_signals.go:204] [ 18568: 18569] Signal 18568, PID: 18569, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.689158 249972 task_exit.go:204] [ 18568: 18569] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.691655 249972 task_exit.go:204] [ 18568: 18569] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.691685 249972 task_exit.go:204] [ 18568: 18569] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.691702 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.694277 249972 task_exit.go:204] [ 18568: 18568] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) D0323 21:16:53.697505 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.697661 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.705570 249972 usertrap_amd64.go:212] [ 18570: 18570] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.705604 249972 usertrap_amd64.go:122] [ 18570: 18570] Allocate a new trap: 0xc00a425530 39 D0323 21:16:53.705713 249972 usertrap_amd64.go:225] [ 18570: 18570] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.706587 249972 usertrap_amd64.go:212] [ 18570: 18570] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.706618 249972 usertrap_amd64.go:122] [ 18570: 18570] Allocate a new trap: 0xc00a425530 40 D0323 21:16:53.706629 249972 usertrap_amd64.go:225] [ 18570: 18570] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.707365 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.707514 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.710008 249972 usertrap_amd64.go:212] [ 18570: 18570] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.710033 249972 usertrap_amd64.go:122] [ 18570: 18570] Allocate a new trap: 0xc00a425530 41 D0323 21:16:53.710042 249972 usertrap_amd64.go:225] [ 18570: 18570] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.718644 249972 usertrap_amd64.go:212] [ 18570: 18570] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.718672 249972 usertrap_amd64.go:122] [ 18570: 18570] Allocate a new trap: 0xc00a425530 42 D0323 21:16:53.718686 249972 usertrap_amd64.go:225] [ 18570: 18570] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.719069 249972 task_exit.go:204] [ 18570: 18570] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.719110 249972 task_exit.go:204] [ 18570: 18570] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.719208 249972 task_signals.go:204] [ 18570: 18571] Signal 18570, PID: 18571, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.719259 249972 task_exit.go:204] [ 18570: 18571] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.721531 249972 task_exit.go:204] [ 18570: 18571] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.721575 249972 task_exit.go:204] [ 18570: 18571] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.721591 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.722469 249972 task_exit.go:204] [ 18570: 18570] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.723148 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.723594 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:53 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000040)={@random="f5523e977eb5", @local, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast}}}}, 0x0) D0323 21:16:53.733372 249972 usertrap_amd64.go:212] [ 18572: 18572] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.733417 249972 usertrap_amd64.go:122] [ 18572: 18572] Allocate a new trap: 0xc007c40f30 39 D0323 21:16:53.733492 249972 usertrap_amd64.go:225] [ 18572: 18572] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.733959 249972 usertrap_amd64.go:212] [ 18572: 18572] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.733979 249972 usertrap_amd64.go:122] [ 18572: 18572] Allocate a new trap: 0xc007c40f30 40 D0323 21:16:53.733997 249972 usertrap_amd64.go:225] [ 18572: 18572] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.734411 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.734636 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.738009 249972 usertrap_amd64.go:212] [ 18572: 18572] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.738037 249972 usertrap_amd64.go:122] [ 18572: 18572] Allocate a new trap: 0xc007c40f30 41 D0323 21:16:53.738055 249972 usertrap_amd64.go:225] [ 18572: 18572] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.747860 249972 usertrap_amd64.go:212] [ 18572: 18573] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:53.747912 249972 usertrap_amd64.go:122] [ 18572: 18573] Allocate a new trap: 0xc007c40f30 42 D0323 21:16:53.747927 249972 usertrap_amd64.go:225] [ 18572: 18573] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.749565 249972 usertrap_amd64.go:212] [ 18572: 18572] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.749592 249972 usertrap_amd64.go:122] [ 18572: 18572] Allocate a new trap: 0xc007c40f30 43 D0323 21:16:53.749601 249972 usertrap_amd64.go:225] [ 18572: 18572] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.749678 249972 task_exit.go:204] [ 18572: 18572] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.749701 249972 task_exit.go:204] [ 18572: 18572] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.749782 249972 task_signals.go:204] [ 18572: 18573] Signal 18572, PID: 18573, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.749816 249972 task_exit.go:204] [ 18572: 18573] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.751298 249972 task_exit.go:204] [ 18572: 18573] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.751326 249972 task_exit.go:204] [ 18572: 18573] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.751339 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.751749 249972 task_exit.go:204] [ 18572: 18572] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r0, &(0x7f0000000580)=ANY=[], 0xfffffecc) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000340)) D0323 21:16:53.757676 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.757847 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.763271 249972 usertrap_amd64.go:212] [ 18574: 18574] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.763302 249972 usertrap_amd64.go:122] [ 18574: 18574] Allocate a new trap: 0xc00ab5daa0 39 D0323 21:16:53.763389 249972 usertrap_amd64.go:225] [ 18574: 18574] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.764667 249972 usertrap_amd64.go:212] [ 18574: 18574] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.764697 249972 usertrap_amd64.go:122] [ 18574: 18574] Allocate a new trap: 0xc00ab5daa0 40 D0323 21:16:53.764713 249972 usertrap_amd64.go:225] [ 18574: 18574] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.765335 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.765484 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.768201 249972 usertrap_amd64.go:212] [ 18574: 18574] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.768287 249972 usertrap_amd64.go:122] [ 18574: 18574] Allocate a new trap: 0xc00ab5daa0 41 D0323 21:16:53.768370 249972 usertrap_amd64.go:225] [ 18574: 18574] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.777910 249972 usertrap_amd64.go:212] [ 18574: 18575] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:53.777945 249972 usertrap_amd64.go:122] [ 18574: 18575] Allocate a new trap: 0xc00ab5daa0 42 D0323 21:16:53.777957 249972 usertrap_amd64.go:225] [ 18574: 18575] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.778786 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.779033 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.781821 249972 usertrap_amd64.go:212] [ 18574: 18574] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.781904 249972 usertrap_amd64.go:122] [ 18574: 18574] Allocate a new trap: 0xc00ab5daa0 43 D0323 21:16:53.781929 249972 usertrap_amd64.go:225] [ 18574: 18574] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.782269 249972 task_exit.go:204] [ 18574: 18574] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.782349 249972 task_exit.go:204] [ 18574: 18574] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.782409 249972 task_signals.go:204] [ 18574: 18575] Signal 18574, PID: 18575, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.782441 249972 task_exit.go:204] [ 18574: 18575] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.783656 249972 task_exit.go:204] [ 18574: 18575] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.783680 249972 task_exit.go:204] [ 18574: 18575] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.783690 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.784786 249972 task_exit.go:204] [ 18574: 18574] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\xb9\xecm1\xc1\xf8\xa6\x8d\xc1\xe2zMN\xc5)\xb9\xc0\xa3\\\xe2I\xcb|SX\x0e\xec>\xcb\xaa', 0x0) write(r0, &(0x7f0000000080)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000800)=ANY=[], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) D0323 21:16:53.787345 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.787535 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.803628 249972 usertrap_amd64.go:212] [ 18576: 18576] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.803663 249972 usertrap_amd64.go:122] [ 18576: 18576] Allocate a new trap: 0xc0087be2a0 39 D0323 21:16:53.803751 249972 usertrap_amd64.go:225] [ 18576: 18576] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.804687 249972 usertrap_amd64.go:212] [ 18576: 18576] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.804715 249972 usertrap_amd64.go:122] [ 18576: 18576] Allocate a new trap: 0xc0087be2a0 40 D0323 21:16:53.804726 249972 usertrap_amd64.go:225] [ 18576: 18576] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.805261 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.805482 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.808617 249972 usertrap_amd64.go:212] [ 18576: 18576] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.808642 249972 usertrap_amd64.go:122] [ 18576: 18576] Allocate a new trap: 0xc0087be2a0 41 D0323 21:16:53.808653 249972 usertrap_amd64.go:225] [ 18576: 18576] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.822802 249972 task_run.go:312] [ 18576: 18576] Unhandled user fault: addr=20000000 ip=560eeddb9ccb access=rw- sig=11 err=operation not permitted D0323 21:16:53.822851 249972 task_log.go:87] [ 18576: 18576] Registers: D0323 21:16:53.822870 249972 task_log.go:94] [ 18576: 18576] Cs = 0000000000000033 D0323 21:16:53.822876 249972 task_log.go:94] [ 18576: 18576] Ds = 0000000000000000 D0323 21:16:53.822880 249972 task_log.go:94] [ 18576: 18576] Eflags = 0000000000010246 D0323 21:16:53.822884 249972 task_log.go:94] [ 18576: 18576] Es = 0000000000000000 D0323 21:16:53.822887 249972 task_log.go:94] [ 18576: 18576] Fs = 0000000000000000 D0323 21:16:53.822890 249972 task_log.go:94] [ 18576: 18576] Fs_base = 0000560eeea6a400 D0323 21:16:53.822894 249972 task_log.go:94] [ 18576: 18576] Gs = 0000000000000000 D0323 21:16:53.822897 249972 task_log.go:94] [ 18576: 18576] Gs_base = 00007fa97ac17000 D0323 21:16:53.822900 249972 task_log.go:94] [ 18576: 18576] Orig_rax = ffffffffffffffff D0323 21:16:53.822903 249972 task_log.go:94] [ 18576: 18576] R10 = 00007ea5f6e00420 D0323 21:16:53.822907 249972 task_log.go:94] [ 18576: 18576] R11 = 0000000000000246 D0323 21:16:53.822910 249972 task_log.go:94] [ 18576: 18576] R12 = 000000000005b823 D0323 21:16:53.822913 249972 task_log.go:94] [ 18576: 18576] R13 = 00007ec99ab4c4c0 D0323 21:16:53.822916 249972 task_log.go:94] [ 18576: 18576] R14 = 0000560eedf39f80 D0323 21:16:53.822926 249972 task_log.go:94] [ 18576: 18576] R15 = 0000000000000032 D0323 21:16:53.822935 249972 task_log.go:94] [ 18576: 18576] R8 = 0000000000000000 D0323 21:16:53.822938 249972 task_log.go:94] [ 18576: 18576] R9 = 0000000000000000 D0323 21:16:53.822942 249972 task_log.go:94] [ 18576: 18576] Rax = 0000000020000000 D0323 21:16:53.822945 249972 task_log.go:94] [ 18576: 18576] Rbp = 00007ec99ab4c498 D0323 21:16:53.822957 249972 task_log.go:94] [ 18576: 18576] Rbx = 0000000000000000 D0323 21:16:53.822964 249972 task_log.go:94] [ 18576: 18576] Rcx = 0000000000000000 D0323 21:16:53.822970 249972 task_log.go:94] [ 18576: 18576] Rdi = 0000560eeea6a2e8 D0323 21:16:53.822976 249972 task_log.go:94] [ 18576: 18576] Rdx = 0000000000000000 D0323 21:16:53.822982 249972 task_log.go:94] [ 18576: 18576] Rip = 0000560eeddb9ccb D0323 21:16:53.822989 249972 task_log.go:94] [ 18576: 18576] Rsi = 0000000000000000 D0323 21:16:53.822995 249972 task_log.go:94] [ 18576: 18576] Rsp = 00007ec99ab4c3a0 D0323 21:16:53.823010 249972 task_log.go:94] [ 18576: 18576] Ss = 000000000000002b D0323 21:16:53.823017 249972 task_log.go:111] [ 18576: 18576] Stack: D0323 21:16:53.823045 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3a0: 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 D0323 21:16:53.823054 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3b0: 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823073 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823080 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3d0: 23 b8 05 00 00 00 00 00 4e 54 dc ed 0e 56 00 00 D0323 21:16:53.823086 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3e0: 00 00 00 00 00 00 00 00 80 9f f3 ed 0e 56 00 00 D0323 21:16:53.823091 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3f0: fe ff ff ff ff ff ff ff 04 00 00 00 00 00 00 00 D0323 21:16:53.823110 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c400: 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 D0323 21:16:53.823116 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c410: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0323 21:16:53.823122 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c420: 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.823127 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c430: a8 54 e7 00 00 00 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.823133 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c440: a8 03 e0 f6 a5 7e 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.823138 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c450: 80 9f f3 ed 0e 56 00 00 00 00 00 20 00 00 00 00 D0323 21:16:53.823144 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c460: 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823150 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c470: 02 00 00 00 00 00 00 00 40 81 f1 ed 0e 56 00 00 D0323 21:16:53.823155 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823167 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c490: 27 55 e7 ed 0e 56 00 00 40 04 e0 f6 a5 7e 00 00 D0323 21:16:53.823173 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4a0: 2f 55 e7 ed 0e 56 00 00 00 67 23 f7 a5 7e 00 00 D0323 21:16:53.823187 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823193 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4c0: 00 00 00 00 00 00 00 00 80 f0 fa 02 00 00 00 00 D0323 21:16:53.823198 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4d0: 76 01 00 00 00 00 00 00 0d 73 d7 30 00 00 00 00 D0323 21:16:53.823203 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4e0: 20 00 00 00 30 00 00 00 c0 c5 b4 9a c9 7e 00 00 D0323 21:16:53.823208 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823214 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c500: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823219 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c510: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823240 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c520: 00 00 00 00 00 00 00 00 50 c4 b4 9a c9 7e 00 00 D0323 21:16:53.823246 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c530: 01 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.823252 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c540: 00 00 00 00 00 00 00 00 00 a0 01 20 00 00 00 00 D0323 21:16:53.823257 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823262 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823267 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c570: 00 00 00 00 00 00 00 00 00 9e be a9 22 fc ee b2 D0323 21:16:53.823273 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c580: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 D0323 21:16:53.823278 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c590: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.823290 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.823296 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5b0: 80 c6 b4 9a c9 7e 00 00 28 65 dc ed 0e 56 00 00 D0323 21:16:53.823304 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5c0: d3 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823310 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5d0: 01 00 00 00 00 00 00 00 40 c6 b4 9a c9 7e 00 00 D0323 21:16:53.823315 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5e0: ee 54 e7 ed 9d 22 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.823321 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5f0: 88 13 00 00 00 00 00 00 32 00 00 00 00 00 00 00 D0323 21:16:53.823326 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c600: 00 00 00 00 00 00 00 00 30 c6 b4 9a c9 7e 00 00 D0323 21:16:53.823331 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c610: 40 c0 b4 9a c9 7e 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823342 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c620: 76 01 00 00 00 00 00 00 07 ba e2 2e 00 00 00 00 D0323 21:16:53.823348 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c630: 76 01 00 00 00 00 00 00 1b c4 15 2d 00 00 00 00 D0323 21:16:53.823354 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c640: 2e 2f 38 38 36 31 00 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.823361 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c650: 79 7a 30 00 79 7a 30 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823367 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c660: c1 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823373 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c670: d4 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823390 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c680: 2f 73 79 7a 63 67 72 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.823397 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c690: 79 7a 30 00 79 7a 30 00 75 70 2e 70 72 6f 63 73 D0323 21:16:53.823403 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6a0: 00 6f 63 73 00 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823409 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6b0: 03 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823421 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6c0: 0c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823428 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6d0: 14 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823434 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6e0: 1c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823455 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6f0: 2a 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823459 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c700: 38 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823463 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c710: 41 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823466 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c720: 49 56 e7 ed 0e 56 00 00 13 00 00 00 00 00 00 00 D0323 21:16:53.823470 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c730: 0c 00 00 00 00 00 00 00 b8 ff ff ff ff ff ff ff D0323 21:16:53.823474 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c740: 00 00 00 00 00 00 00 00 b0 bd b4 9a c9 7e 00 00 D0323 21:16:53.823477 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c750: 78 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823481 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c760: 87 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823485 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c770: 8f 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.823492 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c780: ff 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823499 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c790: 03 55 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.823513 249972 task_log.go:149] [ 18576: 18576] Code: D0323 21:16:53.823520 249972 task_log.go:167] [ 18576: 18576] 560eeddb9c80: b7 ff ff 48 83 f8 02 0f 85 5b 03 00 00 48 8b 44 D0323 21:16:53.823527 249972 task_log.go:167] [ 18576: 18576] 560eeddb9c90: 24 20 48 0b 44 24 28 0f 85 e4 00 00 00 48 8b 04 D0323 21:16:53.823534 249972 task_log.go:167] [ 18576: 18576] 560eeddb9ca0: 24 48 85 c0 74 1b 48 83 f8 01 0f 85 5a 03 00 00 D0323 21:16:53.823550 249972 task_log.go:167] [ 18576: 18576] 560eeddb9cb0: 0f b7 44 24 18 66 c1 c0 08 0f b7 c0 48 89 44 24 D0323 21:16:53.823556 249972 task_log.go:167] [ 18576: 18576] 560eeddb9cc0: 18 48 8b 44 24 10 0f b7 54 24 18 66 89 10 e9 70 D0323 21:16:53.823568 249972 task_log.go:167] [ 18576: 18576] 560eeddb9cd0: fe ff ff 48 83 7c 24 08 08 0f 85 09 03 00 00 48 D0323 21:16:53.823572 249972 task_log.go:167] [ 18576: 18576] 560eeddb9ce0: 8b 44 24 20 48 0b 44 24 28 74 64 48 8b 44 24 10 D0323 21:16:53.823575 249972 task_log.go:167] [ 18576: 18576] 560eeddb9cf0: 48 8b 10 48 8b 04 24 48 85 c0 0f 84 36 02 00 00 D0323 21:16:53.823579 249972 task_log.go:71] [ 18576: 18576] Mappings: VMAs: 00060000-00065000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-20007000 --xs 00000000 00:04 820 /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) 20007000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d920000-1b2dd20000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560eedd8e000-560eeddb2000 r--p 00000000 00:08 8 /syz-executor 560eeddb2000-560eede64000 r-xp 00024000 00:08 8 /syz-executor 560eede64000-560eedeb6000 r--p 000d6000 00:08 8 /syz-executor 560eedeb7000-560eedf10000 r--p 00128000 00:08 8 /syz-executor 560eedf10000-560eedf19000 rw-p 00181000 00:08 8 /syz-executor 560eedf1e000-560eeea6a000 rw-p 00000000 00:00 0 560eeea6a000-560eeea8c000 rw-p 00000000 00:00 0 [heap] 7ea5f6600000-7ea5f6800000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6800000-7ea5f6a00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6a00000-7ea5f6c00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6c00000-7ea5f6e00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6e00000-7ea5f7200000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7ea5f7216000-7ea5f7217000 ---p 00000000 00:00 0 7ea5f7217000-7ea5f7237000 rw-p 00000000 00:00 0 7ea5f7237000-7ea5f7238000 r--p 00000000 00:00 0 [vvar] 7ea5f7238000-7ea5f723a000 r-xp 00000000 00:00 0 7ec99a34d000-7ec99ab4d000 rw-p 00000000 00:00 0 [stack] PMAs: 00060000-00061000 r-xp 01d95000 *pgalloc.MemoryFile 00061000-00065000 r-xp 00bfb000 *pgalloc.MemoryFile 20000000-20007000 r-xs 06ebe000 *pgalloc.MemoryFile 20007000-20200000 rwxp 07207000 *pgalloc.MemoryFile 1b2d920000-1b2dd20000 rw-s 0ea00000 *pgalloc.MemoryFile 560eedd8e000-560eeddb2000 r--p 06dd5000 *pgalloc.MemoryFile 560eeddb2000-560eeddcb000 r-xs 00024000 *gofer.dentryPlatformFile 560eeddcb000-560eeddcc000 r-xp 01d98000 *pgalloc.MemoryFile 560eeddcc000-560eeddcd000 r-xp 01d96000 *pgalloc.MemoryFile 560eeddcd000-560eeddce000 r-xp 013f9000 *pgalloc.MemoryFile 560eeddce000-560eede17000 r-xs 00040000 *gofer.dentryPlatformFile 560eede17000-560eede18000 r-xp 01d9f000 *pgalloc.MemoryFile 560eede18000-560eede19000 r-xp 01d97000 *pgalloc.MemoryFile 560eede19000-560eede1a000 r-xp 033ff000 *pgalloc.MemoryFile 560eede1a000-560eede1b000 r-xp 013fa000 *pgalloc.MemoryFile 560eede1b000-560eede1c000 r-xp 03be2000 *pgalloc.MemoryFile 560eede1c000-560eede3e000 r-xs 0008e000 *gofer.dentryPlatformFile 560eede3e000-560eede3f000 r-xp 033fe000 *pgalloc.MemoryFile 560eede3f000-560eede40000 r-xp 01d9d000 *pgalloc.MemoryFile 560eede57000-560eede58000 r-xp 01d99000 *pgalloc.MemoryFile 560eede63000-560eede64000 r-xp 00bf9000 *pgalloc.MemoryFile 560eede64000-560eedeb6000 r--p 09955000 *pgalloc.MemoryFile 560eedeb7000-560eedf19000 rw-p 06ffc000 *pgalloc.MemoryFile 560eedf1e000-560eee000000 rw-p 0705e000 *pgalloc.MemoryFile 560eeea00000-560eeea6a000 rw-p 06f19000 *pgalloc.MemoryFile 560eeea6a000-560eeea6b000 rw-p 013f7000 *pgalloc.MemoryFile 560eeea6b000-560eeea8c000 rw-p 07140000 *pgalloc.MemoryFile 7ea5f6c00000-7ea5f6e00000 rw-s 0fc00000 *pgalloc.MemoryFile 7ea5f6e00000-7ea5f7200000 r--s 0e600000 *pgalloc.MemoryFile 7ea5f7217000-7ea5f7237000 rw-p 06f83000 *pgalloc.MemoryFile 7ea5f7237000-7ea5f7238000 r--s 00002000 *pgalloc.MemoryFile 7ea5f7238000-7ea5f723a000 r-xs 00000000 *pgalloc.MemoryFile 7ec99aa00000-7ec99ab49000 r--p 0fa00000 *pgalloc.MemoryFile 7ec99ab49000-7ec99ab4b000 r--p 06ebb000 *pgalloc.MemoryFile 7ec99ab4b000-7ec99ab4d000 rw-p 01d9b000 *pgalloc.MemoryFile D0323 21:16:53.823723 249972 task_log.go:73] [ 18576: 18576] FDTable: fd:2 => name pipe:[5] fd:3 => name /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) fd:216 => name /sys/kernel/debug/kcov fd:220 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:219 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:5 => name socket:[38463] fd:217 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:4 => name socket:[38462] fd:201 => name / fd:215 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:200 => name /dev/net/tun D0323 21:16:53.823787 249972 task_signals.go:470] [ 18576: 18576] Notified of signal 11 D0323 21:16:53.823810 249972 task_signals.go:220] [ 18576: 18576] Signal 11: delivering to handler D0323 21:16:53.823979 249972 task_run.go:312] [ 18576: 18576] Unhandled user fault: addr=20000002 ip=560eeddb9dfa access=rw- sig=11 err=operation not permitted D0323 21:16:53.824006 249972 task_log.go:87] [ 18576: 18576] Registers: D0323 21:16:53.824020 249972 task_log.go:94] [ 18576: 18576] Cs = 0000000000000033 D0323 21:16:53.824027 249972 task_log.go:94] [ 18576: 18576] Ds = 0000000000000000 D0323 21:16:53.824033 249972 task_log.go:94] [ 18576: 18576] Eflags = 0000000000010246 D0323 21:16:53.824040 249972 task_log.go:94] [ 18576: 18576] Es = 0000000000000000 D0323 21:16:53.824046 249972 task_log.go:94] [ 18576: 18576] Fs = 0000000000000000 D0323 21:16:53.824052 249972 task_log.go:94] [ 18576: 18576] Fs_base = 0000560eeea6a400 D0323 21:16:53.824058 249972 task_log.go:94] [ 18576: 18576] Gs = 0000000000000000 D0323 21:16:53.824064 249972 task_log.go:94] [ 18576: 18576] Gs_base = 00007fa97ac17000 D0323 21:16:53.824081 249972 task_log.go:94] [ 18576: 18576] Orig_rax = ffffffffffffffff D0323 21:16:53.824087 249972 task_log.go:94] [ 18576: 18576] R10 = 00007ea5f6e00448 D0323 21:16:53.824093 249972 task_log.go:94] [ 18576: 18576] R11 = 0000000000000246 D0323 21:16:53.824098 249972 task_log.go:94] [ 18576: 18576] R12 = 000000000005b823 D0323 21:16:53.824104 249972 task_log.go:94] [ 18576: 18576] R13 = 00007ec99ab4c4c0 D0323 21:16:53.824111 249972 task_log.go:94] [ 18576: 18576] R14 = 0000560eedf39f80 D0323 21:16:53.824117 249972 task_log.go:94] [ 18576: 18576] R15 = 0000000000000032 D0323 21:16:53.824123 249972 task_log.go:94] [ 18576: 18576] R8 = 0000000000000000 D0323 21:16:53.824129 249972 task_log.go:94] [ 18576: 18576] R9 = 0000000000000000 D0323 21:16:53.824143 249972 task_log.go:94] [ 18576: 18576] Rax = 0000000020000002 D0323 21:16:53.824150 249972 task_log.go:94] [ 18576: 18576] Rbp = 00007ec99ab4c498 D0323 21:16:53.824156 249972 task_log.go:94] [ 18576: 18576] Rbx = 0000000000000000 D0323 21:16:53.824162 249972 task_log.go:94] [ 18576: 18576] Rcx = 0000000000000000 D0323 21:16:53.824175 249972 task_log.go:94] [ 18576: 18576] Rdi = 0000560eeea6a2e8 D0323 21:16:53.824187 249972 task_log.go:94] [ 18576: 18576] Rdx = 0000000000000000 D0323 21:16:53.824200 249972 task_log.go:94] [ 18576: 18576] Rip = 0000560eeddb9dfa D0323 21:16:53.824207 249972 task_log.go:94] [ 18576: 18576] Rsi = 0000000000000000 D0323 21:16:53.824213 249972 task_log.go:94] [ 18576: 18576] Rsp = 00007ec99ab4c3a0 D0323 21:16:53.824225 249972 task_log.go:94] [ 18576: 18576] Ss = 000000000000002b D0323 21:16:53.824231 249972 task_log.go:111] [ 18576: 18576] Stack: D0323 21:16:53.824238 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.824251 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3b0: 02 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824257 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824264 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3d0: 23 b8 05 00 00 00 00 00 4e 54 dc ed 0e 56 00 00 D0323 21:16:53.824275 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3e0: 00 00 00 00 00 00 00 00 80 9f f3 ed 0e 56 00 00 D0323 21:16:53.824282 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3f0: fe ff ff ff ff ff ff ff 04 00 00 00 00 00 00 00 D0323 21:16:53.824289 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c400: 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 D0323 21:16:53.824300 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c410: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0323 21:16:53.824306 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c420: 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.824313 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c430: a8 54 e7 00 00 00 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.824329 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c440: a8 03 e0 f6 a5 7e 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.824338 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c450: 80 9f f3 ed 0e 56 00 00 02 00 00 20 00 00 00 00 D0323 21:16:53.824352 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c460: 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.824360 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c470: 02 00 00 00 00 00 00 00 40 81 f1 ed 0e 56 00 00 D0323 21:16:53.824367 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824374 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c490: 27 55 e7 ed 0e 56 00 00 68 04 e0 f6 a5 7e 00 00 D0323 21:16:53.824389 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4a0: 2f 55 e7 ed 0e 56 00 00 00 67 23 f7 a5 7e 00 00 D0323 21:16:53.824396 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824403 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4c0: 00 00 00 00 00 00 00 00 80 f0 fa 02 00 00 00 00 D0323 21:16:53.824409 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4d0: 76 01 00 00 00 00 00 00 0d 73 d7 30 00 00 00 00 D0323 21:16:53.824415 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4e0: 20 00 00 00 30 00 00 00 c0 c5 b4 9a c9 7e 00 00 D0323 21:16:53.824429 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824436 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c500: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824443 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c510: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824456 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c520: 00 00 00 00 00 00 00 00 50 c4 b4 9a c9 7e 00 00 D0323 21:16:53.824463 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c530: 01 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.824470 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c540: 00 00 00 00 00 00 00 00 00 a0 01 20 00 00 00 00 D0323 21:16:53.824484 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824491 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824507 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c570: 00 00 00 00 00 00 00 00 00 9e be a9 22 fc ee b2 D0323 21:16:53.824523 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c580: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 D0323 21:16:53.824546 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c590: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.824562 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.824578 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5b0: 80 c6 b4 9a c9 7e 00 00 28 65 dc ed 0e 56 00 00 D0323 21:16:53.824602 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5c0: d3 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.824623 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5d0: 01 00 00 00 00 00 00 00 40 c6 b4 9a c9 7e 00 00 D0323 21:16:53.824630 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5e0: ee 54 e7 ed 9d 22 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.824637 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5f0: 88 13 00 00 00 00 00 00 32 00 00 00 00 00 00 00 D0323 21:16:53.825324 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c600: 00 00 00 00 00 00 00 00 30 c6 b4 9a c9 7e 00 00 D0323 21:16:53.825349 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c610: 40 c0 b4 9a c9 7e 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825356 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c620: 76 01 00 00 00 00 00 00 07 ba e2 2e 00 00 00 00 D0323 21:16:53.825362 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c630: 76 01 00 00 00 00 00 00 1b c4 15 2d 00 00 00 00 D0323 21:16:53.825368 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c640: 2e 2f 38 38 36 31 00 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.825375 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c650: 79 7a 30 00 79 7a 30 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825380 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c660: c1 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825386 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c670: d4 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825392 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c680: 2f 73 79 7a 63 67 72 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.825398 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c690: 79 7a 30 00 79 7a 30 00 75 70 2e 70 72 6f 63 73 D0323 21:16:53.825403 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6a0: 00 6f 63 73 00 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825414 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6b0: 03 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825419 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6c0: 0c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825424 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6d0: 14 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825429 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6e0: 1c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825434 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6f0: 2a 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825440 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c700: 38 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825445 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c710: 41 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825450 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c720: 49 56 e7 ed 0e 56 00 00 13 00 00 00 00 00 00 00 D0323 21:16:53.825455 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c730: 0c 00 00 00 00 00 00 00 b8 ff ff ff ff ff ff ff D0323 21:16:53.825460 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c740: 00 00 00 00 00 00 00 00 b0 bd b4 9a c9 7e 00 00 D0323 21:16:53.825465 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c750: 78 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825470 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c760: 87 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825475 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c770: 8f 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.825482 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c780: ff 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.825487 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c790: 03 55 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.825492 249972 task_log.go:149] [ 18576: 18576] Code: D0323 21:16:53.825497 249972 task_log.go:167] [ 18576: 18576] 560eeddb9db0: 24 20 48 d3 e0 48 83 e8 01 89 f9 48 d3 e0 48 89 D0323 21:16:53.825503 249972 task_log.go:167] [ 18576: 18576] 560eeddb9dc0: c6 48 8b 44 24 18 48 d3 e0 31 d0 21 f0 31 d0 66 D0323 21:16:53.825509 249972 task_log.go:167] [ 18576: 18576] 560eeddb9dd0: c1 c0 08 0f b7 c0 48 8b 54 24 10 66 89 02 e9 60 D0323 21:16:53.825514 249972 task_log.go:167] [ 18576: 18576] 560eeddb9de0: fd ff ff 48 8b 04 24 48 85 c0 0f 85 6f fe ff ff D0323 21:16:53.825519 249972 task_log.go:167] [ 18576: 18576] 560eeddb9df0: 48 8b 44 24 10 0f b6 54 24 18 88 10 e9 42 fd ff D0323 21:16:53.825524 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e00: ff 48 8b 54 24 08 48 8d 35 54 b0 0b 00 48 8d 3d D0323 21:16:53.825529 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e10: 68 b1 0b 00 31 c0 e8 45 b6 ff ff 48 8b 54 24 08 D0323 21:16:53.825534 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e20: 48 8d 35 3a b0 0b 00 48 8d 3d 80 b1 0b 00 31 c0 D0323 21:16:53.825539 249972 task_log.go:71] [ 18576: 18576] Mappings: VMAs: 00060000-00065000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-20007000 --xs 00000000 00:04 820 /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) 20007000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d920000-1b2dd20000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560eedd8e000-560eeddb2000 r--p 00000000 00:08 8 /syz-executor 560eeddb2000-560eede64000 r-xp 00024000 00:08 8 /syz-executor 560eede64000-560eedeb6000 r--p 000d6000 00:08 8 /syz-executor 560eedeb7000-560eedf10000 r--p 00128000 00:08 8 /syz-executor 560eedf10000-560eedf19000 rw-p 00181000 00:08 8 /syz-executor 560eedf1e000-560eeea6a000 rw-p 00000000 00:00 0 560eeea6a000-560eeea8c000 rw-p 00000000 00:00 0 [heap] 7ea5f6600000-7ea5f6800000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6800000-7ea5f6a00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6a00000-7ea5f6c00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6c00000-7ea5f6e00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6e00000-7ea5f7200000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7ea5f7216000-7ea5f7217000 ---p 00000000 00:00 0 7ea5f7217000-7ea5f7237000 rw-p 00000000 00:00 0 7ea5f7237000-7ea5f7238000 r--p 00000000 00:00 0 [vvar] 7ea5f7238000-7ea5f723a000 r-xp 00000000 00:00 0 7ec99a34d000-7ec99ab4d000 rw-p 00000000 00:00 0 [stack] PMAs: 00060000-00061000 r-xp 01d95000 *pgalloc.MemoryFile 00061000-00065000 r-xp 00bfb000 *pgalloc.MemoryFile 20000000-20007000 r-xs 06ebe000 *pgalloc.MemoryFile 20007000-20200000 rwxp 07207000 *pgalloc.MemoryFile 1b2d920000-1b2dd20000 rw-s 0ea00000 *pgalloc.MemoryFile 560eedd8e000-560eeddb2000 r--p 06dd5000 *pgalloc.MemoryFile 560eeddb2000-560eeddcb000 r-xs 00024000 *gofer.dentryPlatformFile 560eeddcb000-560eeddcc000 r-xp 01d98000 *pgalloc.MemoryFile 560eeddcc000-560eeddcd000 r-xp 01d96000 *pgalloc.MemoryFile 560eeddcd000-560eeddce000 r-xp 013f9000 *pgalloc.MemoryFile 560eeddce000-560eede17000 r-xs 00040000 *gofer.dentryPlatformFile 560eede17000-560eede18000 r-xp 01d9f000 *pgalloc.MemoryFile 560eede18000-560eede19000 r-xp 01d97000 *pgalloc.MemoryFile 560eede19000-560eede1a000 r-xp 033ff000 *pgalloc.MemoryFile 560eede1a000-560eede1b000 r-xp 013fa000 *pgalloc.MemoryFile 560eede1b000-560eede1c000 r-xp 03be2000 *pgalloc.MemoryFile 560eede1c000-560eede3e000 r-xs 0008e000 *gofer.dentryPlatformFile 560eede3e000-560eede3f000 r-xp 033fe000 *pgalloc.MemoryFile 560eede3f000-560eede40000 r-xp 01d9d000 *pgalloc.MemoryFile 560eede57000-560eede58000 r-xp 01d99000 *pgalloc.MemoryFile 560eede63000-560eede64000 r-xp 00bf9000 *pgalloc.MemoryFile 560eede64000-560eedeb6000 r--p 09955000 *pgalloc.MemoryFile 560eedeb7000-560eedf19000 rw-p 06ffc000 *pgalloc.MemoryFile 560eedf1e000-560eee000000 rw-p 0705e000 *pgalloc.MemoryFile 560eeea00000-560eeea6a000 rw-p 06f19000 *pgalloc.MemoryFile 560eeea6a000-560eeea6b000 rw-p 013f7000 *pgalloc.MemoryFile 560eeea6b000-560eeea8c000 rw-p 07140000 *pgalloc.MemoryFile 7ea5f6c00000-7ea5f6e00000 rw-s 0fc00000 *pgalloc.MemoryFile 7ea5f6e00000-7ea5f7200000 r--s 0e600000 *pgalloc.MemoryFile 7ea5f7217000-7ea5f7237000 rw-p 06f83000 *pgalloc.MemoryFile 7ea5f7237000-7ea5f7238000 r--s 00002000 *pgalloc.MemoryFile 7ea5f7238000-7ea5f723a000 r-xs 00000000 *pgalloc.MemoryFile 7ec99aa00000-7ec99ab49000 r--p 0fa00000 *pgalloc.MemoryFile 7ec99ab49000-7ec99ab4b000 r--p 06ebb000 *pgalloc.MemoryFile 7ec99ab4b000-7ec99ab4d000 rw-p 01d9b000 *pgalloc.MemoryFile D0323 21:16:53.825643 249972 task_log.go:73] [ 18576: 18576] FDTable: fd:3 => name /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) fd:5 => name socket:[38463] fd:216 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:201 => name / fd:219 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:2 => name pipe:[5] fd:4 => name socket:[38462] fd:215 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:220 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:200 => name /dev/net/tun fd:218 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov D0323 21:16:53.825682 249972 task_signals.go:470] [ 18576: 18576] Notified of signal 11 D0323 21:16:53.825694 249972 task_signals.go:220] [ 18576: 18576] Signal 11: delivering to handler D0323 21:16:53.826279 249972 task_run.go:312] [ 18576: 18576] Unhandled user fault: addr=20000003 ip=560eeddb9dfa access=rw- sig=11 err=operation not permitted D0323 21:16:53.826309 249972 task_log.go:87] [ 18576: 18576] Registers: D0323 21:16:53.826318 249972 task_log.go:94] [ 18576: 18576] Cs = 0000000000000033 D0323 21:16:53.826322 249972 task_log.go:94] [ 18576: 18576] Ds = 0000000000000000 D0323 21:16:53.826326 249972 task_log.go:94] [ 18576: 18576] Eflags = 0000000000010246 D0323 21:16:53.826329 249972 task_log.go:94] [ 18576: 18576] Es = 0000000000000000 D0323 21:16:53.826333 249972 task_log.go:94] [ 18576: 18576] Fs = 0000000000000000 D0323 21:16:53.826336 249972 task_log.go:94] [ 18576: 18576] Fs_base = 0000560eeea6a400 D0323 21:16:53.826339 249972 task_log.go:94] [ 18576: 18576] Gs = 0000000000000000 D0323 21:16:53.826342 249972 task_log.go:94] [ 18576: 18576] Gs_base = 00007fa97ac17000 D0323 21:16:53.826346 249972 task_log.go:94] [ 18576: 18576] Orig_rax = ffffffffffffffff D0323 21:16:53.826349 249972 task_log.go:94] [ 18576: 18576] R10 = 00007ea5f6e00470 D0323 21:16:53.826352 249972 task_log.go:94] [ 18576: 18576] R11 = 0000000000000246 D0323 21:16:53.826355 249972 task_log.go:94] [ 18576: 18576] R12 = 000000000005b823 D0323 21:16:53.826359 249972 task_log.go:94] [ 18576: 18576] R13 = 00007ec99ab4c4c0 D0323 21:16:53.826362 249972 task_log.go:94] [ 18576: 18576] R14 = 0000560eedf39f80 D0323 21:16:53.826365 249972 task_log.go:94] [ 18576: 18576] R15 = 0000000000000032 D0323 21:16:53.826369 249972 task_log.go:94] [ 18576: 18576] R8 = 0000000000000000 D0323 21:16:53.826386 249972 task_log.go:94] [ 18576: 18576] R9 = 0000000000000000 D0323 21:16:53.826390 249972 task_log.go:94] [ 18576: 18576] Rax = 0000000020000003 D0323 21:16:53.826393 249972 task_log.go:94] [ 18576: 18576] Rbp = 00007ec99ab4c498 D0323 21:16:53.826396 249972 task_log.go:94] [ 18576: 18576] Rbx = 0000000000000000 D0323 21:16:53.826401 249972 task_log.go:94] [ 18576: 18576] Rcx = 0000000000000000 D0323 21:16:53.826409 249972 task_log.go:94] [ 18576: 18576] Rdi = 0000560eeea6a2e8 D0323 21:16:53.826415 249972 task_log.go:94] [ 18576: 18576] Rdx = 0000000000000000 D0323 21:16:53.826421 249972 task_log.go:94] [ 18576: 18576] Rip = 0000560eeddb9dfa D0323 21:16:53.826427 249972 task_log.go:94] [ 18576: 18576] Rsi = 0000000000000000 D0323 21:16:53.826433 249972 task_log.go:94] [ 18576: 18576] Rsp = 00007ec99ab4c3a0 D0323 21:16:53.826446 249972 task_log.go:94] [ 18576: 18576] Ss = 000000000000002b D0323 21:16:53.826449 249972 task_log.go:111] [ 18576: 18576] Stack: D0323 21:16:53.826453 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.826465 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3b0: 03 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826469 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826482 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3d0: 23 b8 05 00 00 00 00 00 4e 54 dc ed 0e 56 00 00 D0323 21:16:53.826489 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3e0: 00 00 00 00 00 00 00 00 80 9f f3 ed 0e 56 00 00 D0323 21:16:53.826507 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3f0: fe ff ff ff ff ff ff ff 04 00 00 00 00 00 00 00 D0323 21:16:53.826514 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c400: 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 D0323 21:16:53.826519 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c410: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0323 21:16:53.826524 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c420: 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.826541 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c430: a8 54 e7 00 00 00 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.826547 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c440: a8 03 e0 f6 a5 7e 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.826552 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c450: 80 9f f3 ed 0e 56 00 00 03 00 00 20 00 00 00 00 D0323 21:16:53.826558 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c460: 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826563 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c470: 02 00 00 00 00 00 00 00 40 81 f1 ed 0e 56 00 00 D0323 21:16:53.826568 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826580 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c490: 27 55 e7 ed 0e 56 00 00 90 04 e0 f6 a5 7e 00 00 D0323 21:16:53.826586 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4a0: 2f 55 e7 ed 0e 56 00 00 00 67 23 f7 a5 7e 00 00 D0323 21:16:53.826591 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826596 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4c0: 00 00 00 00 00 00 00 00 80 f0 fa 02 00 00 00 00 D0323 21:16:53.826602 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4d0: 76 01 00 00 00 00 00 00 0d 73 d7 30 00 00 00 00 D0323 21:16:53.826607 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4e0: 20 00 00 00 30 00 00 00 c0 c5 b4 9a c9 7e 00 00 D0323 21:16:53.826619 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826627 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c500: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826632 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c510: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826644 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c520: 00 00 00 00 00 00 00 00 50 c4 b4 9a c9 7e 00 00 D0323 21:16:53.826657 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c530: 01 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.826663 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c540: 00 00 00 00 00 00 00 00 00 a0 01 20 00 00 00 00 D0323 21:16:53.826668 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826674 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826679 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c570: 00 00 00 00 00 00 00 00 00 9e be a9 22 fc ee b2 D0323 21:16:53.826690 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c580: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 D0323 21:16:53.826702 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c590: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.826715 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.826724 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5b0: 80 c6 b4 9a c9 7e 00 00 28 65 dc ed 0e 56 00 00 D0323 21:16:53.826730 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5c0: d3 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826735 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5d0: 01 00 00 00 00 00 00 00 40 c6 b4 9a c9 7e 00 00 D0323 21:16:53.826742 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5e0: ee 54 e7 ed 9d 22 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.826754 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5f0: 88 13 00 00 00 00 00 00 32 00 00 00 00 00 00 00 D0323 21:16:53.826760 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c600: 00 00 00 00 00 00 00 00 30 c6 b4 9a c9 7e 00 00 D0323 21:16:53.826765 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c610: 40 c0 b4 9a c9 7e 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826772 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c620: 76 01 00 00 00 00 00 00 07 ba e2 2e 00 00 00 00 D0323 21:16:53.826783 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c630: 76 01 00 00 00 00 00 00 1b c4 15 2d 00 00 00 00 D0323 21:16:53.826789 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c640: 2e 2f 38 38 36 31 00 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.826794 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c650: 79 7a 30 00 79 7a 30 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826809 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c660: c1 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826822 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c670: d4 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826828 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c680: 2f 73 79 7a 63 67 72 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.826839 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c690: 79 7a 30 00 79 7a 30 00 75 70 2e 70 72 6f 63 73 D0323 21:16:53.826845 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6a0: 00 6f 63 73 00 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826851 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6b0: 03 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826863 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6c0: 0c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826875 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6d0: 14 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826880 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6e0: 1c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826886 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6f0: 2a 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826892 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c700: 38 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826897 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c710: 41 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826902 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c720: 49 56 e7 ed 0e 56 00 00 13 00 00 00 00 00 00 00 D0323 21:16:53.826916 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c730: 0c 00 00 00 00 00 00 00 b8 ff ff ff ff ff ff ff D0323 21:16:53.826930 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c740: 00 00 00 00 00 00 00 00 b0 bd b4 9a c9 7e 00 00 D0323 21:16:53.826937 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c750: 78 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826945 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c760: 87 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826961 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c770: 8f 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.826968 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c780: ff 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826975 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c790: 03 55 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.826981 249972 task_log.go:149] [ 18576: 18576] Code: D0323 21:16:53.826988 249972 task_log.go:167] [ 18576: 18576] 560eeddb9db0: 24 20 48 d3 e0 48 83 e8 01 89 f9 48 d3 e0 48 89 D0323 21:16:53.827008 249972 task_log.go:167] [ 18576: 18576] 560eeddb9dc0: c6 48 8b 44 24 18 48 d3 e0 31 d0 21 f0 31 d0 66 D0323 21:16:53.827017 249972 task_log.go:167] [ 18576: 18576] 560eeddb9dd0: c1 c0 08 0f b7 c0 48 8b 54 24 10 66 89 02 e9 60 D0323 21:16:53.827023 249972 task_log.go:167] [ 18576: 18576] 560eeddb9de0: fd ff ff 48 8b 04 24 48 85 c0 0f 85 6f fe ff ff D0323 21:16:53.827030 249972 task_log.go:167] [ 18576: 18576] 560eeddb9df0: 48 8b 44 24 10 0f b6 54 24 18 88 10 e9 42 fd ff D0323 21:16:53.827036 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e00: ff 48 8b 54 24 08 48 8d 35 54 b0 0b 00 48 8d 3d D0323 21:16:53.827042 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e10: 68 b1 0b 00 31 c0 e8 45 b6 ff ff 48 8b 54 24 08 D0323 21:16:53.827047 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e20: 48 8d 35 3a b0 0b 00 48 8d 3d 80 b1 0b 00 31 c0 D0323 21:16:53.827053 249972 task_log.go:71] [ 18576: 18576] Mappings: VMAs: 00060000-00065000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-20007000 --xs 00000000 00:04 820 /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) 20007000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d920000-1b2dd20000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560eedd8e000-560eeddb2000 r--p 00000000 00:08 8 /syz-executor 560eeddb2000-560eede64000 r-xp 00024000 00:08 8 /syz-executor 560eede64000-560eedeb6000 r--p 000d6000 00:08 8 /syz-executor 560eedeb7000-560eedf10000 r--p 00128000 00:08 8 /syz-executor 560eedf10000-560eedf19000 rw-p 00181000 00:08 8 /syz-executor 560eedf1e000-560eeea6a000 rw-p 00000000 00:00 0 560eeea6a000-560eeea8c000 rw-p 00000000 00:00 0 [heap] 7ea5f6600000-7ea5f6800000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6800000-7ea5f6a00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6a00000-7ea5f6c00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6c00000-7ea5f6e00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6e00000-7ea5f7200000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7ea5f7216000-7ea5f7217000 ---p 00000000 00:00 0 7ea5f7217000-7ea5f7237000 rw-p 00000000 00:00 0 7ea5f7237000-7ea5f7238000 r--p 00000000 00:00 0 [vvar] 7ea5f7238000-7ea5f723a000 r-xp 00000000 00:00 0 7ec99a34d000-7ec99ab4d000 rw-p 00000000 00:00 0 [stack] PMAs: 00060000-00061000 r-xp 01d95000 *pgalloc.MemoryFile 00061000-00065000 r-xp 00bfb000 *pgalloc.MemoryFile 20000000-20007000 r-xs 06ebe000 *pgalloc.MemoryFile 20007000-20200000 rwxp 07207000 *pgalloc.MemoryFile 1b2d920000-1b2dd20000 rw-s 0ea00000 *pgalloc.MemoryFile 560eedd8e000-560eeddb2000 r--p 06dd5000 *pgalloc.MemoryFile 560eeddb2000-560eeddcb000 r-xs 00024000 *gofer.dentryPlatformFile 560eeddcb000-560eeddcc000 r-xp 01d98000 *pgalloc.MemoryFile 560eeddcc000-560eeddcd000 r-xp 01d96000 *pgalloc.MemoryFile 560eeddcd000-560eeddce000 r-xp 013f9000 *pgalloc.MemoryFile 560eeddce000-560eede17000 r-xs 00040000 *gofer.dentryPlatformFile 560eede17000-560eede18000 r-xp 01d9f000 *pgalloc.MemoryFile 560eede18000-560eede19000 r-xp 01d97000 *pgalloc.MemoryFile 560eede19000-560eede1a000 r-xp 033ff000 *pgalloc.MemoryFile 560eede1a000-560eede1b000 r-xp 013fa000 *pgalloc.MemoryFile 560eede1b000-560eede1c000 r-xp 03be2000 *pgalloc.MemoryFile 560eede1c000-560eede3e000 r-xs 0008e000 *gofer.dentryPlatformFile 560eede3e000-560eede3f000 r-xp 033fe000 *pgalloc.MemoryFile 560eede3f000-560eede40000 r-xp 01d9d000 *pgalloc.MemoryFile 560eede57000-560eede58000 r-xp 01d99000 *pgalloc.MemoryFile 560eede63000-560eede64000 r-xp 00bf9000 *pgalloc.MemoryFile 560eede64000-560eedeb6000 r--p 09955000 *pgalloc.MemoryFile 560eedeb7000-560eedf19000 rw-p 06ffc000 *pgalloc.MemoryFile 560eedf1e000-560eee000000 rw-p 0705e000 *pgalloc.MemoryFile 560eeea00000-560eeea6a000 rw-p 06f19000 *pgalloc.MemoryFile 560eeea6a000-560eeea6b000 rw-p 013f7000 *pgalloc.MemoryFile 560eeea6b000-560eeea8c000 rw-p 07140000 *pgalloc.MemoryFile 7ea5f6c00000-7ea5f6e00000 rw-s 0fc00000 *pgalloc.MemoryFile 7ea5f6e00000-7ea5f7200000 r--s 0e600000 *pgalloc.MemoryFile 7ea5f7217000-7ea5f7237000 rw-p 06f83000 *pgalloc.MemoryFile 7ea5f7237000-7ea5f7238000 r--s 00002000 *pgalloc.MemoryFile 7ea5f7238000-7ea5f723a000 r-xs 00000000 *pgalloc.MemoryFile 7ec99aa00000-7ec99ab49000 r--p 0fa00000 *pgalloc.MemoryFile 7ec99ab49000-7ec99ab4b000 r--p 06ebb000 *pgalloc.MemoryFile 7ec99ab4b000-7ec99ab4d000 rw-p 01d9b000 *pgalloc.MemoryFile D0323 21:16:53.827170 249972 task_log.go:73] [ 18576: 18576] FDTable: fd:220 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:201 => name / fd:216 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:5 => name socket:[38463] fd:223 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:2 => name pipe:[5] fd:200 => name /dev/net/tun fd:218 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:3 => name /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) fd:4 => name socket:[38462] fd:215 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov D0323 21:16:53.827200 249972 task_signals.go:470] [ 18576: 18576] Notified of signal 11 D0323 21:16:53.827207 249972 task_signals.go:220] [ 18576: 18576] Signal 11: delivering to handler D0323 21:16:53.827308 249972 task_run.go:312] [ 18576: 18576] Unhandled user fault: addr=20000004 ip=560eeddb9e6a access=rw- sig=11 err=operation not permitted D0323 21:16:53.827340 249972 task_log.go:87] [ 18576: 18576] Registers: D0323 21:16:53.827353 249972 task_log.go:94] [ 18576: 18576] Cs = 0000000000000033 D0323 21:16:53.827359 249972 task_log.go:94] [ 18576: 18576] Ds = 0000000000000000 D0323 21:16:53.827365 249972 task_log.go:94] [ 18576: 18576] Eflags = 0000000000010246 D0323 21:16:53.827371 249972 task_log.go:94] [ 18576: 18576] Es = 0000000000000000 D0323 21:16:53.827377 249972 task_log.go:94] [ 18576: 18576] Fs = 0000000000000000 D0323 21:16:53.827383 249972 task_log.go:94] [ 18576: 18576] Fs_base = 0000560eeea6a400 D0323 21:16:53.827387 249972 task_log.go:94] [ 18576: 18576] Gs = 0000000000000000 D0323 21:16:53.827403 249972 task_log.go:94] [ 18576: 18576] Gs_base = 00007fa97ac17000 D0323 21:16:53.827410 249972 task_log.go:94] [ 18576: 18576] Orig_rax = ffffffffffffffff D0323 21:16:53.827424 249972 task_log.go:94] [ 18576: 18576] R10 = 00007ea5f6e00498 D0323 21:16:53.827437 249972 task_log.go:94] [ 18576: 18576] R11 = 0000000000000246 D0323 21:16:53.827444 249972 task_log.go:94] [ 18576: 18576] R12 = 000000000005b823 D0323 21:16:53.827456 249972 task_log.go:94] [ 18576: 18576] R13 = 00007ec99ab4c4c0 D0323 21:16:53.827469 249972 task_log.go:94] [ 18576: 18576] R14 = 0000560eedf39f80 D0323 21:16:53.827476 249972 task_log.go:94] [ 18576: 18576] R15 = 0000000000000032 D0323 21:16:53.827482 249972 task_log.go:94] [ 18576: 18576] R8 = 0000000000000000 D0323 21:16:53.827496 249972 task_log.go:94] [ 18576: 18576] R9 = 0000000000000000 D0323 21:16:53.827502 249972 task_log.go:94] [ 18576: 18576] Rax = 0000000020000004 D0323 21:16:53.827509 249972 task_log.go:94] [ 18576: 18576] Rbp = 00007ec99ab4c498 D0323 21:16:53.827515 249972 task_log.go:94] [ 18576: 18576] Rbx = 0000000000000000 D0323 21:16:53.827521 249972 task_log.go:94] [ 18576: 18576] Rcx = 0000000000000000 D0323 21:16:53.827536 249972 task_log.go:94] [ 18576: 18576] Rdi = 0000560eeea6a2e8 D0323 21:16:53.827559 249972 task_log.go:94] [ 18576: 18576] Rdx = a991bc141b5fdef9 D0323 21:16:53.827566 249972 task_log.go:94] [ 18576: 18576] Rip = 0000560eeddb9e6a D0323 21:16:53.827578 249972 task_log.go:94] [ 18576: 18576] Rsi = 0000000000000000 D0323 21:16:53.827584 249972 task_log.go:94] [ 18576: 18576] Rsp = 00007ec99ab4c3a0 D0323 21:16:53.827590 249972 task_log.go:94] [ 18576: 18576] Ss = 000000000000002b D0323 21:16:53.827596 249972 task_log.go:111] [ 18576: 18576] Stack: D0323 21:16:53.827606 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3a0: 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 D0323 21:16:53.827621 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3b0: 04 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827629 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827642 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3d0: 23 b8 05 00 00 00 00 00 4e 54 dc ed 0e 56 00 00 D0323 21:16:53.827656 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3e0: 00 00 00 00 00 00 00 00 80 9f f3 ed 0e 56 00 00 D0323 21:16:53.827664 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c3f0: fe ff ff ff ff ff ff ff 04 00 00 00 00 00 00 00 D0323 21:16:53.827671 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c400: 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 D0323 21:16:53.827677 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c410: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0323 21:16:53.827691 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c420: 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.827698 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c430: a8 54 e7 00 00 00 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.827705 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c440: a8 03 e0 f6 a5 7e 00 00 13 b8 05 00 00 00 00 00 D0323 21:16:53.827712 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c450: 80 9f f3 ed 0e 56 00 00 04 00 00 20 00 00 00 00 D0323 21:16:53.827726 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c460: 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.827733 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c470: 02 00 00 00 00 00 00 00 40 81 f1 ed 0e 56 00 00 D0323 21:16:53.827741 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827747 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c490: 27 55 e7 ed 0e 56 00 00 b8 04 e0 f6 a5 7e 00 00 D0323 21:16:53.827758 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4a0: 2f 55 e7 ed 0e 56 00 00 00 67 23 f7 a5 7e 00 00 D0323 21:16:53.827771 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827779 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4c0: 00 00 00 00 00 00 00 00 80 f0 fa 02 00 00 00 00 D0323 21:16:53.827786 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4d0: 76 01 00 00 00 00 00 00 0d 73 d7 30 00 00 00 00 D0323 21:16:53.827792 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4e0: 20 00 00 00 30 00 00 00 c0 c5 b4 9a c9 7e 00 00 D0323 21:16:53.827807 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c4f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827815 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c500: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827822 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c510: 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827835 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c520: 00 00 00 00 00 00 00 00 50 c4 b4 9a c9 7e 00 00 D0323 21:16:53.827842 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c530: 01 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 D0323 21:16:53.827848 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c540: 00 00 00 00 00 00 00 00 00 a0 01 20 00 00 00 00 D0323 21:16:53.827854 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827861 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827867 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c570: 00 00 00 00 00 00 00 00 00 9e be a9 22 fc ee b2 D0323 21:16:53.827883 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c580: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 D0323 21:16:53.827894 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c590: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.827900 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5a0: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.827908 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5b0: 80 c6 b4 9a c9 7e 00 00 28 65 dc ed 0e 56 00 00 D0323 21:16:53.827914 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5c0: d3 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.827921 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5d0: 01 00 00 00 00 00 00 00 40 c6 b4 9a c9 7e 00 00 D0323 21:16:53.827940 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5e0: ee 54 e7 ed 9d 22 00 00 01 00 00 00 00 00 00 00 D0323 21:16:53.827964 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c5f0: 88 13 00 00 00 00 00 00 32 00 00 00 00 00 00 00 D0323 21:16:53.827976 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c600: 00 00 00 00 00 00 00 00 30 c6 b4 9a c9 7e 00 00 D0323 21:16:53.827983 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c610: 40 c0 b4 9a c9 7e 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.827990 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c620: 76 01 00 00 00 00 00 00 07 ba e2 2e 00 00 00 00 D0323 21:16:53.828045 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c630: 76 01 00 00 00 00 00 00 1b c4 15 2d 00 00 00 00 D0323 21:16:53.828057 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c640: 2e 2f 38 38 36 31 00 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.828064 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c650: 79 7a 30 00 79 7a 30 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828070 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c660: c1 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828077 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c670: d4 52 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828084 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c680: 2f 73 79 7a 63 67 72 6f 75 70 2f 6e 65 74 2f 73 D0323 21:16:53.828095 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c690: 79 7a 30 00 79 7a 30 00 75 70 2e 70 72 6f 63 73 D0323 21:16:53.828101 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6a0: 00 6f 63 73 00 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828117 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6b0: 03 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828123 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6c0: 0c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828129 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6d0: 14 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828135 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6e0: 1c 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828167 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c6f0: 2a 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828177 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c700: 38 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828183 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c710: 41 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828189 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c720: 49 56 e7 ed 0e 56 00 00 13 00 00 00 00 00 00 00 D0323 21:16:53.828195 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c730: 0c 00 00 00 00 00 00 00 b8 ff ff ff ff ff ff ff D0323 21:16:53.828206 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c740: 00 00 00 00 00 00 00 00 b0 bd b4 9a c9 7e 00 00 D0323 21:16:53.828212 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c750: 78 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828219 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c760: 87 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828229 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c770: 8f 56 e7 ed 0e 56 00 00 06 00 00 00 00 00 00 00 D0323 21:16:53.828236 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c780: ff 54 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.828240 249972 task_log.go:128] [ 18576: 18576] 7ec99ab4c790: 03 55 e7 ed 0e 56 00 00 00 00 00 00 00 00 00 00 D0323 21:16:53.828243 249972 task_log.go:149] [ 18576: 18576] Code: D0323 21:16:53.828248 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e20: 48 8d 35 3a b0 0b 00 48 8d 3d 80 b1 0b 00 31 c0 D0323 21:16:53.828252 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e30: e8 2b b6 ff ff 48 8b 44 24 20 48 0b 44 24 28 75 D0323 21:16:53.828256 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e40: 30 48 8b 34 24 48 85 f6 74 17 8b 44 24 18 0f c8 D0323 21:16:53.828259 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e50: 89 c0 48 89 44 24 18 48 83 fe 01 0f 85 a1 01 00 D0323 21:16:53.828263 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e60: 00 48 8b 44 24 10 8b 74 24 18 89 30 e9 d2 fc ff D0323 21:16:53.828266 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e70: ff 48 8b 44 24 10 8b 10 48 8b 04 24 48 85 c0 0f D0323 21:16:53.828270 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e80: 84 e2 00 00 00 48 83 f8 01 0f 85 7b 01 00 00 0f D0323 21:16:53.828274 249972 task_log.go:167] [ 18576: 18576] 560eeddb9e90: b6 4c 24 28 48 8b 34 24 89 d0 4c 8b 54 24 20 48 D0323 21:16:53.828277 249972 task_log.go:71] [ 18576: 18576] Mappings: VMAs: 00060000-00065000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-20007000 --xs 00000000 00:04 820 /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) 20007000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d920000-1b2dd20000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 560eedd8e000-560eeddb2000 r--p 00000000 00:08 8 /syz-executor 560eeddb2000-560eede64000 r-xp 00024000 00:08 8 /syz-executor 560eede64000-560eedeb6000 r--p 000d6000 00:08 8 /syz-executor 560eedeb7000-560eedf10000 r--p 00128000 00:08 8 /syz-executor 560eedf10000-560eedf19000 rw-p 00181000 00:08 8 /syz-executor 560eedf1e000-560eeea6a000 rw-p 00000000 00:00 0 560eeea6a000-560eeea8c000 rw-p 00000000 00:00 0 [heap] 7ea5f6600000-7ea5f6800000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6800000-7ea5f6a00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6a00000-7ea5f6c00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6c00000-7ea5f6e00000 rw-s 00000000 00:00 0 [kcov:29] 7ea5f6e00000-7ea5f7200000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7ea5f7216000-7ea5f7217000 ---p 00000000 00:00 0 7ea5f7217000-7ea5f7237000 rw-p 00000000 00:00 0 7ea5f7237000-7ea5f7238000 r--p 00000000 00:00 0 [vvar] 7ea5f7238000-7ea5f723a000 r-xp 00000000 00:00 0 7ec99a34d000-7ec99ab4d000 rw-p 00000000 00:00 0 [stack] PMAs: 00060000-00061000 r-xp 01d95000 *pgalloc.MemoryFile 00061000-00065000 r-xp 00bfb000 *pgalloc.MemoryFile 20000000-20007000 r-xs 06ebe000 *pgalloc.MemoryFile 20007000-20200000 rwxp 07207000 *pgalloc.MemoryFile 1b2d920000-1b2dd20000 rw-s 0ea00000 *pgalloc.MemoryFile 560eedd8e000-560eeddb2000 r--p 06dd5000 *pgalloc.MemoryFile 560eeddb2000-560eeddcb000 r-xs 00024000 *gofer.dentryPlatformFile 560eeddcb000-560eeddcc000 r-xp 01d98000 *pgalloc.MemoryFile 560eeddcc000-560eeddcd000 r-xp 01d96000 *pgalloc.MemoryFile 560eeddcd000-560eeddce000 r-xp 013f9000 *pgalloc.MemoryFile 560eeddce000-560eede17000 r-xs 00040000 *gofer.dentryPlatformFile 560eede17000-560eede18000 r-xp 01d9f000 *pgalloc.MemoryFile 560eede18000-560eede19000 r-xp 01d97000 *pgalloc.MemoryFile 560eede19000-560eede1a000 r-xp 033ff000 *pgalloc.MemoryFile 560eede1a000-560eede1b000 r-xp 013fa000 *pgalloc.MemoryFile 560eede1b000-560eede1c000 r-xp 03be2000 *pgalloc.MemoryFile 560eede1c000-560eede3e000 r-xs 0008e000 *gofer.dentryPlatformFile 560eede3e000-560eede3f000 r-xp 033fe000 *pgalloc.MemoryFile 560eede3f000-560eede40000 r-xp 01d9d000 *pgalloc.MemoryFile 560eede57000-560eede58000 r-xp 01d99000 *pgalloc.MemoryFile 560eede63000-560eede64000 r-xp 00bf9000 *pgalloc.MemoryFile 560eede64000-560eedeb6000 r--p 09955000 *pgalloc.MemoryFile 560eedeb7000-560eedf19000 rw-p 06ffc000 *pgalloc.MemoryFile 560eedf1e000-560eee000000 rw-p 0705e000 *pgalloc.MemoryFile 560eeea00000-560eeea6a000 rw-p 06f19000 *pgalloc.MemoryFile 560eeea6a000-560eeea6b000 rw-p 013f7000 *pgalloc.MemoryFile 560eeea6b000-560eeea8c000 rw-p 07140000 *pgalloc.MemoryFile 7ea5f6c00000-7ea5f6e00000 rw-s 0fc00000 *pgalloc.MemoryFile 7ea5f6e00000-7ea5f7200000 r--s 0e600000 *pgalloc.MemoryFile 7ea5f7217000-7ea5f7237000 rw-p 06f83000 *pgalloc.MemoryFile 7ea5f7237000-7ea5f7238000 r--s 00002000 *pgalloc.MemoryFile 7ea5f7238000-7ea5f723a000 r-xs 00000000 *pgalloc.MemoryFile 7ec99aa00000-7ec99ab49000 r--p 0fa00000 *pgalloc.MemoryFile 7ec99ab49000-7ec99ab4b000 r--p 06ebb000 *pgalloc.MemoryFile 7ec99ab4b000-7ec99ab4d000 rw-p 01d9b000 *pgalloc.MemoryFile D0323 21:16:53.828351 249972 task_log.go:73] [ 18576: 18576] FDTable: fd:221 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:3 => name /memfd:¹ìm1Áø¦ÁâzMNÅ)¹À£\âIË|SXì>˪ (deleted) fd:5 => name socket:[38463] fd:216 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:200 => name /dev/net/tun fd:201 => name / fd:215 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:2 => name pipe:[5] fd:4 => name socket:[38462] fd:220 => name /sys/kernel/debug/kcov D0323 21:16:53.828384 249972 task_signals.go:470] [ 18576: 18576] Notified of signal 11 D0323 21:16:53.828391 249972 task_signals.go:220] [ 18576: 18576] Signal 11: delivering to handler D0323 21:16:53.829354 249972 usertrap_amd64.go:212] [ 18576: 18576] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.829385 249972 usertrap_amd64.go:122] [ 18576: 18576] Allocate a new trap: 0xc0087be2a0 42 D0323 21:16:53.829399 249972 usertrap_amd64.go:225] [ 18576: 18576] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.829756 249972 task_exit.go:204] [ 18576: 18576] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.829791 249972 task_exit.go:204] [ 18576: 18576] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.829790 249972 task_signals.go:204] [ 18576: 18577] Signal 18576, PID: 18577, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.829812 249972 task_exit.go:204] [ 18576: 18577] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.831566 249972 task_exit.go:204] [ 18576: 18577] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.831604 249972 task_exit.go:204] [ 18576: 18577] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.831624 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.832382 249972 task_exit.go:204] [ 18576: 18576] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket(0x1c, 0x5, 0x0) connect$inet(r0, &(0x7f0000000240)={0x10, 0x2}, 0x10) D0323 21:16:53.834726 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.834930 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.843610 249972 usertrap_amd64.go:212] [ 18578: 18578] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.843641 249972 usertrap_amd64.go:122] [ 18578: 18578] Allocate a new trap: 0xc00b2f0f90 39 D0323 21:16:53.843729 249972 usertrap_amd64.go:225] [ 18578: 18578] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.844109 249972 usertrap_amd64.go:212] [ 18578: 18578] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.844128 249972 usertrap_amd64.go:122] [ 18578: 18578] Allocate a new trap: 0xc00b2f0f90 40 D0323 21:16:53.844136 249972 usertrap_amd64.go:225] [ 18578: 18578] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.844487 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.845127 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.848322 249972 usertrap_amd64.go:212] [ 18578: 18578] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.848385 249972 usertrap_amd64.go:122] [ 18578: 18578] Allocate a new trap: 0xc00b2f0f90 41 D0323 21:16:53.848402 249972 usertrap_amd64.go:225] [ 18578: 18578] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.855056 249972 usertrap_amd64.go:212] [ 18578: 18578] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.855080 249972 usertrap_amd64.go:122] [ 18578: 18578] Allocate a new trap: 0xc00b2f0f90 42 D0323 21:16:53.855090 249972 usertrap_amd64.go:225] [ 18578: 18578] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.855349 249972 task_exit.go:204] [ 18578: 18578] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.855375 249972 task_exit.go:204] [ 18578: 18578] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.855560 249972 task_signals.go:204] [ 18578: 18579] Signal 18578, PID: 18579, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.855604 249972 task_exit.go:204] [ 18578: 18579] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.857255 249972 task_exit.go:204] [ 18578: 18579] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.857279 249972 task_exit.go:204] [ 18578: 18579] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.857288 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.858663 249972 task_exit.go:204] [ 18578: 18578] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100), 0xc) D0323 21:16:53.859692 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.859900 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.870659 249972 usertrap_amd64.go:212] [ 18580: 18580] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.870677 249972 usertrap_amd64.go:122] [ 18580: 18580] Allocate a new trap: 0xc003c30810 39 D0323 21:16:53.870766 249972 usertrap_amd64.go:225] [ 18580: 18580] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.871374 249972 usertrap_amd64.go:212] [ 18580: 18580] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.871396 249972 usertrap_amd64.go:122] [ 18580: 18580] Allocate a new trap: 0xc003c30810 40 D0323 21:16:53.871406 249972 usertrap_amd64.go:225] [ 18580: 18580] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.871788 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.871924 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.874122 249972 usertrap_amd64.go:212] [ 18580: 18580] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.874149 249972 usertrap_amd64.go:122] [ 18580: 18580] Allocate a new trap: 0xc003c30810 41 D0323 21:16:53.874158 249972 usertrap_amd64.go:225] [ 18580: 18580] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.880569 249972 usertrap_amd64.go:212] [ 18580: 18580] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.880597 249972 usertrap_amd64.go:122] [ 18580: 18580] Allocate a new trap: 0xc003c30810 42 D0323 21:16:53.880606 249972 usertrap_amd64.go:225] [ 18580: 18580] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.880904 249972 task_exit.go:204] [ 18580: 18580] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.880933 249972 task_exit.go:204] [ 18580: 18580] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.880992 249972 task_signals.go:204] [ 18580: 18581] Signal 18580, PID: 18581, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.881018 249972 task_exit.go:204] [ 18580: 18581] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.882721 249972 task_exit.go:204] [ 18580: 18581] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.882758 249972 task_exit.go:204] [ 18580: 18581] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.882771 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.883912 249972 task_exit.go:204] [ 18580: 18580] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r1, r0, 0x0, 0x1000000107fff) D0323 21:16:53.884991 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.885127 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.892236 249972 usertrap_amd64.go:212] [ 18582: 18582] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.892267 249972 usertrap_amd64.go:122] [ 18582: 18582] Allocate a new trap: 0xc009027ad0 39 D0323 21:16:53.892389 249972 usertrap_amd64.go:225] [ 18582: 18582] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.892891 249972 usertrap_amd64.go:212] [ 18582: 18582] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.892907 249972 usertrap_amd64.go:122] [ 18582: 18582] Allocate a new trap: 0xc009027ad0 40 D0323 21:16:53.892914 249972 usertrap_amd64.go:225] [ 18582: 18582] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.894105 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.894303 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.897725 249972 usertrap_amd64.go:212] [ 18582: 18582] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.897764 249972 usertrap_amd64.go:122] [ 18582: 18582] Allocate a new trap: 0xc009027ad0 41 D0323 21:16:53.897779 249972 usertrap_amd64.go:225] [ 18582: 18582] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.907739 249972 usertrap_amd64.go:212] [ 18582: 18582] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.907826 249972 usertrap_amd64.go:122] [ 18582: 18582] Allocate a new trap: 0xc009027ad0 42 D0323 21:16:53.907845 249972 usertrap_amd64.go:225] [ 18582: 18582] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.908278 249972 task_exit.go:204] [ 18582: 18582] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.908312 249972 task_exit.go:204] [ 18582: 18582] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.908436 249972 task_signals.go:204] [ 18582: 18583] Signal 18582, PID: 18583, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.908472 249972 task_exit.go:204] [ 18582: 18583] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.909881 249972 task_exit.go:204] [ 18582: 18583] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.909924 249972 task_exit.go:204] [ 18582: 18583] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.909945 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.911058 249972 task_exit.go:204] [ 18582: 18582] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: unshare(0x40000400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'rose0\x00'}, 0x18) D0323 21:16:53.912509 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.912653 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.921035 249972 usertrap_amd64.go:212] [ 18584: 18584] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.921086 249972 usertrap_amd64.go:122] [ 18584: 18584] Allocate a new trap: 0xc00b2f1380 39 D0323 21:16:53.921187 249972 usertrap_amd64.go:225] [ 18584: 18584] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.921759 249972 usertrap_amd64.go:212] [ 18584: 18584] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.921784 249972 usertrap_amd64.go:122] [ 18584: 18584] Allocate a new trap: 0xc00b2f1380 40 D0323 21:16:53.921794 249972 usertrap_amd64.go:225] [ 18584: 18584] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.922585 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.922819 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.925820 249972 usertrap_amd64.go:212] [ 18584: 18584] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.925844 249972 usertrap_amd64.go:122] [ 18584: 18584] Allocate a new trap: 0xc00b2f1380 41 D0323 21:16:53.925853 249972 usertrap_amd64.go:225] [ 18584: 18584] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.934986 249972 usertrap_amd64.go:212] [ 18584: 18584] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.935248 249972 usertrap_amd64.go:122] [ 18584: 18584] Allocate a new trap: 0xc00b2f1380 42 D0323 21:16:53.935336 249972 usertrap_amd64.go:225] [ 18584: 18584] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.935772 249972 task_exit.go:204] [ 18584: 18584] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.935831 249972 task_exit.go:204] [ 18584: 18584] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.935898 249972 task_signals.go:204] [ 18584: 18585] Signal 18584, PID: 18585, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.935917 249972 task_exit.go:204] [ 18584: 18585] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.938251 249972 task_exit.go:204] [ 18584: 18585] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.938275 249972 task_exit.go:204] [ 18584: 18585] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.938286 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.941113 249972 task_exit.go:204] [ 18584: 18584] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r0, &(0x7f0000000580)=ANY=[], 0xfffffecc) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "ada325346cedd768f2a40babffcf0f32c3f986"}) D0323 21:16:53.943905 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.944846 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.953772 249972 usertrap_amd64.go:212] [ 18586: 18586] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.953800 249972 usertrap_amd64.go:122] [ 18586: 18586] Allocate a new trap: 0xc00b2f1440 39 D0323 21:16:53.953875 249972 usertrap_amd64.go:225] [ 18586: 18586] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.954352 249972 usertrap_amd64.go:212] [ 18586: 18586] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.954367 249972 usertrap_amd64.go:122] [ 18586: 18586] Allocate a new trap: 0xc00b2f1440 40 D0323 21:16:53.954374 249972 usertrap_amd64.go:225] [ 18586: 18586] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.961411 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.961644 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.965262 249972 usertrap_amd64.go:212] [ 18586: 18586] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.965286 249972 usertrap_amd64.go:122] [ 18586: 18586] Allocate a new trap: 0xc00b2f1440 41 D0323 21:16:53.965297 249972 usertrap_amd64.go:225] [ 18586: 18586] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:53.974754 249972 usertrap_amd64.go:212] [ 18586: 18587] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:53.974790 249972 usertrap_amd64.go:122] [ 18586: 18587] Allocate a new trap: 0xc00b2f1440 42 D0323 21:16:53.974803 249972 usertrap_amd64.go:225] [ 18586: 18587] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:53.975329 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.975510 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.979577 249972 usertrap_amd64.go:212] [ 18586: 18586] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:53.979605 249972 usertrap_amd64.go:122] [ 18586: 18586] Allocate a new trap: 0xc00b2f1440 43 D0323 21:16:53.979616 249972 usertrap_amd64.go:225] [ 18586: 18586] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:53.979902 249972 task_exit.go:204] [ 18586: 18586] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.979932 249972 task_exit.go:204] [ 18586: 18586] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.980026 249972 task_signals.go:204] [ 18586: 18587] Signal 18586, PID: 18587, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:53.980093 249972 task_exit.go:204] [ 18586: 18587] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:53.981652 249972 task_exit.go:204] [ 18586: 18587] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:53.981688 249972 task_exit.go:204] [ 18586: 18587] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:53.981701 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:53.982779 249972 task_exit.go:204] [ 18586: 18586] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = accept4(r1, &(0x7f0000000140)=@qipcrtr, &(0x7f0000000200)=0x80, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0xac64, 0x7, 0x7, 0x20}) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x2880008, r1}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x7}) D0323 21:16:53.984032 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:53.984183 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.991284 249972 usertrap_amd64.go:212] [ 18588: 18588] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:53.991316 249972 usertrap_amd64.go:122] [ 18588: 18588] Allocate a new trap: 0xc00a425b30 39 D0323 21:16:53.991448 249972 usertrap_amd64.go:225] [ 18588: 18588] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:53.992375 249972 usertrap_amd64.go:212] [ 18588: 18588] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:53.992438 249972 usertrap_amd64.go:122] [ 18588: 18588] Allocate a new trap: 0xc00a425b30 40 D0323 21:16:53.992485 249972 usertrap_amd64.go:225] [ 18588: 18588] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:53.993138 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:53.993374 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:53.996568 249972 usertrap_amd64.go:212] [ 18588: 18588] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:53.996639 249972 usertrap_amd64.go:122] [ 18588: 18588] Allocate a new trap: 0xc00a425b30 41 D0323 21:16:53.996662 249972 usertrap_amd64.go:225] [ 18588: 18588] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.033166 249972 usertrap_amd64.go:212] [ 18588: 18588] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.033269 249972 usertrap_amd64.go:122] [ 18588: 18588] Allocate a new trap: 0xc00a425b30 42 D0323 21:16:54.033294 249972 usertrap_amd64.go:225] [ 18588: 18588] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.037446 249972 task_exit.go:204] [ 18588: 18588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.037572 249972 task_exit.go:204] [ 18588: 18588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.037601 249972 task_signals.go:204] [ 18588: 18589] Signal 18588, PID: 18589, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.037629 249972 task_exit.go:204] [ 18588: 18589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.045512 249972 task_exit.go:204] [ 18588: 18589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.045546 249972 task_exit.go:204] [ 18588: 18589] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.045562 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.046613 249972 task_exit.go:204] [ 18588: 18588] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000500)={0x10, 0x2}, 0x10) D0323 21:16:54.050776 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.051010 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.064922 249972 usertrap_amd64.go:212] [ 18590: 18590] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.064983 249972 usertrap_amd64.go:122] [ 18590: 18590] Allocate a new trap: 0xc008f8c390 39 D0323 21:16:54.065067 249972 usertrap_amd64.go:225] [ 18590: 18590] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.069521 249972 usertrap_amd64.go:212] [ 18590: 18590] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.069544 249972 usertrap_amd64.go:122] [ 18590: 18590] Allocate a new trap: 0xc008f8c390 40 D0323 21:16:54.069554 249972 usertrap_amd64.go:225] [ 18590: 18590] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.070691 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.070897 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.075923 249972 usertrap_amd64.go:212] [ 18590: 18590] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.075971 249972 usertrap_amd64.go:122] [ 18590: 18590] Allocate a new trap: 0xc008f8c390 41 D0323 21:16:54.075986 249972 usertrap_amd64.go:225] [ 18590: 18590] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.090289 249972 usertrap_amd64.go:212] [ 18590: 18590] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.090349 249972 usertrap_amd64.go:122] [ 18590: 18590] Allocate a new trap: 0xc008f8c390 42 D0323 21:16:54.090365 249972 usertrap_amd64.go:225] [ 18590: 18590] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.090873 249972 task_exit.go:204] [ 18590: 18590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.090918 249972 task_exit.go:204] [ 18590: 18590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.090976 249972 task_signals.go:204] [ 18590: 18591] Signal 18590, PID: 18591, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.091019 249972 task_exit.go:204] [ 18590: 18591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.092444 249972 task_exit.go:204] [ 18590: 18591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.092482 249972 task_exit.go:204] [ 18590: 18591] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.092498 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.092996 249972 task_exit.go:204] [ 18590: 18590] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.095601 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:54 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000022c0)) D0323 21:16:54.095784 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.104309 249972 usertrap_amd64.go:212] [ 18592: 18592] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.104346 249972 usertrap_amd64.go:122] [ 18592: 18592] Allocate a new trap: 0xc0087be5a0 39 D0323 21:16:54.104414 249972 usertrap_amd64.go:225] [ 18592: 18592] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.105306 249972 usertrap_amd64.go:212] [ 18592: 18592] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.105330 249972 usertrap_amd64.go:122] [ 18592: 18592] Allocate a new trap: 0xc0087be5a0 40 D0323 21:16:54.105342 249972 usertrap_amd64.go:225] [ 18592: 18592] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.105878 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.106210 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.109376 249972 usertrap_amd64.go:212] [ 18592: 18592] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.109476 249972 usertrap_amd64.go:122] [ 18592: 18592] Allocate a new trap: 0xc0087be5a0 41 D0323 21:16:54.109503 249972 usertrap_amd64.go:225] [ 18592: 18592] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.116417 249972 usertrap_amd64.go:212] [ 18592: 18592] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.116473 249972 usertrap_amd64.go:122] [ 18592: 18592] Allocate a new trap: 0xc0087be5a0 42 D0323 21:16:54.116490 249972 usertrap_amd64.go:225] [ 18592: 18592] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.116935 249972 task_exit.go:204] [ 18592: 18592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.117014 249972 task_exit.go:204] [ 18592: 18592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.117097 249972 task_signals.go:204] [ 18592: 18593] Signal 18592, PID: 18593, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.117195 249972 task_exit.go:204] [ 18592: 18593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.118632 249972 task_exit.go:204] [ 18592: 18593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.118676 249972 task_exit.go:204] [ 18592: 18593] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.118699 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.119737 249972 task_exit.go:204] [ 18592: 18592] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.121138 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.121340 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000080), 0x4) D0323 21:16:54.133027 249972 usertrap_amd64.go:212] [ 18594: 18594] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.133060 249972 usertrap_amd64.go:122] [ 18594: 18594] Allocate a new trap: 0xc009027c80 39 D0323 21:16:54.133182 249972 usertrap_amd64.go:225] [ 18594: 18594] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.134435 249972 usertrap_amd64.go:212] [ 18594: 18594] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.134468 249972 usertrap_amd64.go:122] [ 18594: 18594] Allocate a new trap: 0xc009027c80 40 D0323 21:16:54.134483 249972 usertrap_amd64.go:225] [ 18594: 18594] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.135131 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.135523 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.139479 249972 usertrap_amd64.go:212] [ 18594: 18594] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.139513 249972 usertrap_amd64.go:122] [ 18594: 18594] Allocate a new trap: 0xc009027c80 41 D0323 21:16:54.139524 249972 usertrap_amd64.go:225] [ 18594: 18594] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.147278 249972 usertrap_amd64.go:212] [ 18594: 18594] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.147311 249972 usertrap_amd64.go:122] [ 18594: 18594] Allocate a new trap: 0xc009027c80 42 D0323 21:16:54.147323 249972 usertrap_amd64.go:225] [ 18594: 18594] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.148608 249972 task_exit.go:204] [ 18594: 18594] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.148647 249972 task_exit.go:204] [ 18594: 18594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.148758 249972 task_signals.go:204] [ 18594: 18595] Signal 18594, PID: 18595, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.148804 249972 task_exit.go:204] [ 18594: 18595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.150444 249972 task_exit.go:204] [ 18594: 18595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.150480 249972 task_exit.go:204] [ 18594: 18595] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.150496 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.152136 249972 task_exit.go:204] [ 18594: 18594] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000fed000/0x12000)=nil, 0x12000, 0x4, 0x10, r0, 0x0) D0323 21:16:54.153934 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.154118 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.165140 249972 usertrap_amd64.go:212] [ 18596: 18596] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.165176 249972 usertrap_amd64.go:122] [ 18596: 18596] Allocate a new trap: 0xc003c308d0 39 D0323 21:16:54.165241 249972 usertrap_amd64.go:225] [ 18596: 18596] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.166200 249972 usertrap_amd64.go:212] [ 18596: 18596] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.166228 249972 usertrap_amd64.go:122] [ 18596: 18596] Allocate a new trap: 0xc003c308d0 40 D0323 21:16:54.166252 249972 usertrap_amd64.go:225] [ 18596: 18596] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.169073 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.169285 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.173061 249972 usertrap_amd64.go:212] [ 18596: 18596] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.173089 249972 usertrap_amd64.go:122] [ 18596: 18596] Allocate a new trap: 0xc003c308d0 41 D0323 21:16:54.173104 249972 usertrap_amd64.go:225] [ 18596: 18596] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.184377 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.185133 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.186568 249972 usertrap_amd64.go:212] [ 18596: 18596] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.186602 249972 usertrap_amd64.go:122] [ 18596: 18596] Allocate a new trap: 0xc003c308d0 42 D0323 21:16:54.186618 249972 usertrap_amd64.go:225] [ 18596: 18596] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.187148 249972 task_exit.go:204] [ 18596: 18596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.187190 249972 task_exit.go:204] [ 18596: 18596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.187252 249972 task_signals.go:204] [ 18596: 18597] Signal 18596, PID: 18597, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.187286 249972 task_exit.go:204] [ 18596: 18597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.189187 249972 task_exit.go:204] [ 18596: 18597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.189212 249972 task_exit.go:204] [ 18596: 18597] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.189225 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.189297 249972 task_exit.go:204] [ 18596: 18596] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: socket(0x1, 0x5, 0x1) D0323 21:16:54.191423 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.191598 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.200493 249972 usertrap_amd64.go:212] [ 18598: 18598] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.200522 249972 usertrap_amd64.go:122] [ 18598: 18598] Allocate a new trap: 0xc003c309c0 39 D0323 21:16:54.200625 249972 usertrap_amd64.go:225] [ 18598: 18598] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.201109 249972 usertrap_amd64.go:212] [ 18598: 18598] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.201175 249972 usertrap_amd64.go:122] [ 18598: 18598] Allocate a new trap: 0xc003c309c0 40 D0323 21:16:54.201230 249972 usertrap_amd64.go:225] [ 18598: 18598] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.201595 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.201873 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.210214 249972 usertrap_amd64.go:212] [ 18598: 18598] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.210248 249972 usertrap_amd64.go:122] [ 18598: 18598] Allocate a new trap: 0xc003c309c0 41 D0323 21:16:54.210262 249972 usertrap_amd64.go:225] [ 18598: 18598] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.216030 249972 usertrap_amd64.go:212] [ 18598: 18598] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.216061 249972 usertrap_amd64.go:122] [ 18598: 18598] Allocate a new trap: 0xc003c309c0 42 D0323 21:16:54.216076 249972 usertrap_amd64.go:225] [ 18598: 18598] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.216540 249972 task_exit.go:204] [ 18598: 18598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.216581 249972 task_exit.go:204] [ 18598: 18598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.216598 249972 task_signals.go:204] [ 18598: 18599] Signal 18598, PID: 18599, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.216628 249972 task_exit.go:204] [ 18598: 18599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.218451 249972 task_exit.go:204] [ 18598: 18599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.218492 249972 task_exit.go:204] [ 18598: 18599] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.218506 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.218629 249972 task_exit.go:204] [ 18598: 18598] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000000ec0)=""/191, 0xbf}, {&(0x7f0000000ac0)=""/40, 0x28}, {&(0x7f0000000f80)=""/162, 0xa2}, {&(0x7f0000001040)=""/100, 0xfffffffffffffdd6}, {&(0x7f00000010c0)=""/246, 0xf6}, {&(0x7f00000011c0)=""/171, 0xab}], 0x6) D0323 21:16:54.220253 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.220376 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.231703 249972 usertrap_amd64.go:212] [ 18600: 18600] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.231742 249972 usertrap_amd64.go:122] [ 18600: 18600] Allocate a new trap: 0xc008f8c870 39 D0323 21:16:54.232058 249972 usertrap_amd64.go:225] [ 18600: 18600] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.233039 249972 usertrap_amd64.go:212] [ 18600: 18600] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.233063 249972 usertrap_amd64.go:122] [ 18600: 18600] Allocate a new trap: 0xc008f8c870 40 D0323 21:16:54.233075 249972 usertrap_amd64.go:225] [ 18600: 18600] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.233530 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.233717 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.236739 249972 usertrap_amd64.go:212] [ 18600: 18600] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.236768 249972 usertrap_amd64.go:122] [ 18600: 18600] Allocate a new trap: 0xc008f8c870 41 D0323 21:16:54.236781 249972 usertrap_amd64.go:225] [ 18600: 18600] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.243338 249972 usertrap_amd64.go:212] [ 18600: 18600] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.243359 249972 usertrap_amd64.go:122] [ 18600: 18600] Allocate a new trap: 0xc008f8c870 42 D0323 21:16:54.243373 249972 usertrap_amd64.go:225] [ 18600: 18600] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.243859 249972 task_exit.go:204] [ 18600: 18600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.243907 249972 task_exit.go:204] [ 18600: 18600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.243989 249972 task_signals.go:204] [ 18600: 18601] Signal 18600, PID: 18601, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.244036 249972 task_exit.go:204] [ 18600: 18601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.245766 249972 task_exit.go:204] [ 18600: 18601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.245807 249972 task_exit.go:204] [ 18600: 18601] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.245832 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.246862 249972 task_exit.go:204] [ 18600: 18600] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) D0323 21:16:54.262651 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.262829 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.270850 249972 usertrap_amd64.go:212] [ 18602: 18602] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.270880 249972 usertrap_amd64.go:122] [ 18602: 18602] Allocate a new trap: 0xc00b2f1a70 39 D0323 21:16:54.271604 249972 usertrap_amd64.go:225] [ 18602: 18602] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.272492 249972 usertrap_amd64.go:212] [ 18602: 18602] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.272515 249972 usertrap_amd64.go:122] [ 18602: 18602] Allocate a new trap: 0xc00b2f1a70 40 D0323 21:16:54.272526 249972 usertrap_amd64.go:225] [ 18602: 18602] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.273353 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.273546 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.276726 249972 usertrap_amd64.go:212] [ 18602: 18602] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.276756 249972 usertrap_amd64.go:122] [ 18602: 18602] Allocate a new trap: 0xc00b2f1a70 41 D0323 21:16:54.276770 249972 usertrap_amd64.go:225] [ 18602: 18602] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.285043 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.285264 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.287026 249972 usertrap_amd64.go:212] [ 18602: 18602] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.287052 249972 usertrap_amd64.go:122] [ 18602: 18602] Allocate a new trap: 0xc00b2f1a70 42 D0323 21:16:54.287065 249972 usertrap_amd64.go:225] [ 18602: 18602] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.287674 249972 task_exit.go:204] [ 18602: 18602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.287740 249972 task_exit.go:204] [ 18602: 18602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.287786 249972 task_signals.go:204] [ 18602: 18603] Signal 18602, PID: 18603, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.287819 249972 task_exit.go:204] [ 18602: 18603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.289355 249972 task_exit.go:204] [ 18602: 18603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.289393 249972 task_exit.go:204] [ 18602: 18603] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.289419 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.290658 249972 task_exit.go:204] [ 18602: 18602] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.291867 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.292029 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:54 executing program 0: select(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0xffff}) D0323 21:16:54.308759 249972 usertrap_amd64.go:212] [ 18604: 18604] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.308835 249972 usertrap_amd64.go:122] [ 18604: 18604] Allocate a new trap: 0xc009027e00 39 D0323 21:16:54.309018 249972 usertrap_amd64.go:225] [ 18604: 18604] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.310417 249972 usertrap_amd64.go:212] [ 18604: 18604] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.310440 249972 usertrap_amd64.go:122] [ 18604: 18604] Allocate a new trap: 0xc009027e00 40 D0323 21:16:54.310452 249972 usertrap_amd64.go:225] [ 18604: 18604] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.311815 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.312822 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.317784 249972 usertrap_amd64.go:212] [ 18604: 18604] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.317798 249972 usertrap_amd64.go:122] [ 18604: 18604] Allocate a new trap: 0xc009027e00 41 D0323 21:16:54.317808 249972 usertrap_amd64.go:225] [ 18604: 18604] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.377540 249972 usertrap_amd64.go:212] [ 18604: 18604] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:54.377592 249972 usertrap_amd64.go:122] [ 18604: 18604] Allocate a new trap: 0xc009027e00 42 D0323 21:16:54.377606 249972 usertrap_amd64.go:225] [ 18604: 18604] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.390818 249972 usertrap_amd64.go:212] [ 18604: 18604] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.390851 249972 usertrap_amd64.go:122] [ 18604: 18604] Allocate a new trap: 0xc009027e00 43 D0323 21:16:54.390866 249972 usertrap_amd64.go:225] [ 18604: 18604] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:54.391443 249972 task_exit.go:204] [ 18604: 18604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.391491 249972 task_exit.go:204] [ 18604: 18604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.391567 249972 task_signals.go:204] [ 18604: 18605] Signal 18604, PID: 18605, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.391599 249972 task_exit.go:204] [ 18604: 18605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.393417 249972 task_exit.go:204] [ 18604: 18605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.393507 249972 task_exit.go:204] [ 18604: 18605] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.393543 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.395706 249972 task_exit.go:204] [ 18604: 18604] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000800), 0x10, 0x0, &(0x7f0000000840)={0x0, 0x4}) D0323 21:16:54.398222 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.398378 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.413864 249972 usertrap_amd64.go:212] [ 18606: 18606] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.413900 249972 usertrap_amd64.go:122] [ 18606: 18606] Allocate a new trap: 0xc008102720 39 D0323 21:16:54.413978 249972 usertrap_amd64.go:225] [ 18606: 18606] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.417650 249972 usertrap_amd64.go:212] [ 18606: 18606] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.417680 249972 usertrap_amd64.go:122] [ 18606: 18606] Allocate a new trap: 0xc008102720 40 D0323 21:16:54.417693 249972 usertrap_amd64.go:225] [ 18606: 18606] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.419482 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.420562 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.435776 249972 usertrap_amd64.go:212] [ 18606: 18606] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.435808 249972 usertrap_amd64.go:122] [ 18606: 18606] Allocate a new trap: 0xc008102720 41 D0323 21:16:54.435822 249972 usertrap_amd64.go:225] [ 18606: 18606] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.441491 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.442160 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.444852 249972 usertrap_amd64.go:212] [ 18606: 18606] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.444874 249972 usertrap_amd64.go:122] [ 18606: 18606] Allocate a new trap: 0xc008102720 42 D0323 21:16:54.444883 249972 usertrap_amd64.go:225] [ 18606: 18606] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.445940 249972 task_exit.go:204] [ 18606: 18606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.445977 249972 task_exit.go:204] [ 18606: 18606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.446041 249972 task_signals.go:204] [ 18606: 18607] Signal 18606, PID: 18607, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.446063 249972 task_exit.go:204] [ 18606: 18607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.447679 249972 task_exit.go:204] [ 18606: 18607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.447702 249972 task_exit.go:204] [ 18606: 18607] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.447714 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.447731 249972 task_exit.go:204] [ 18606: 18606] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001540)) getitimer(0x1, &(0x7f0000001580)) D0323 21:16:54.451488 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.451708 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.459752 249972 usertrap_amd64.go:212] [ 18608: 18608] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.459779 249972 usertrap_amd64.go:122] [ 18608: 18608] Allocate a new trap: 0xc003c30e70 39 D0323 21:16:54.459874 249972 usertrap_amd64.go:225] [ 18608: 18608] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.460747 249972 usertrap_amd64.go:212] [ 18608: 18608] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.460816 249972 usertrap_amd64.go:122] [ 18608: 18608] Allocate a new trap: 0xc003c30e70 40 D0323 21:16:54.460833 249972 usertrap_amd64.go:225] [ 18608: 18608] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.461492 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.461680 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.466340 249972 usertrap_amd64.go:212] [ 18608: 18608] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.466372 249972 usertrap_amd64.go:122] [ 18608: 18608] Allocate a new trap: 0xc003c30e70 41 D0323 21:16:54.466384 249972 usertrap_amd64.go:225] [ 18608: 18608] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.476600 249972 usertrap_amd64.go:212] [ 18608: 18608] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.476637 249972 usertrap_amd64.go:122] [ 18608: 18608] Allocate a new trap: 0xc003c30e70 42 D0323 21:16:54.476651 249972 usertrap_amd64.go:225] [ 18608: 18608] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.477179 249972 task_exit.go:204] [ 18608: 18608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.477228 249972 task_exit.go:204] [ 18608: 18608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.477276 249972 task_signals.go:204] [ 18608: 18609] Signal 18608, PID: 18609, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.477375 249972 task_exit.go:204] [ 18608: 18609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.478897 249972 task_exit.go:204] [ 18608: 18609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.478929 249972 task_exit.go:204] [ 18608: 18609] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.478942 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.479862 249972 task_exit.go:204] [ 18608: 18608] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) D0323 21:16:54.481880 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.482053 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.490190 249972 usertrap_amd64.go:212] [ 18610: 18610] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.490222 249972 usertrap_amd64.go:122] [ 18610: 18610] Allocate a new trap: 0xc003c30ff0 39 D0323 21:16:54.490358 249972 usertrap_amd64.go:225] [ 18610: 18610] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.491324 249972 usertrap_amd64.go:212] [ 18610: 18610] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.491354 249972 usertrap_amd64.go:122] [ 18610: 18610] Allocate a new trap: 0xc003c30ff0 40 D0323 21:16:54.491372 249972 usertrap_amd64.go:225] [ 18610: 18610] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.492018 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.492229 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.498438 249972 usertrap_amd64.go:212] [ 18610: 18610] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.498538 249972 usertrap_amd64.go:122] [ 18610: 18610] Allocate a new trap: 0xc003c30ff0 41 D0323 21:16:54.498629 249972 usertrap_amd64.go:225] [ 18610: 18610] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.505503 249972 usertrap_amd64.go:212] [ 18610: 18610] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.505530 249972 usertrap_amd64.go:122] [ 18610: 18610] Allocate a new trap: 0xc003c30ff0 42 D0323 21:16:54.505539 249972 usertrap_amd64.go:225] [ 18610: 18610] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.505957 249972 task_exit.go:204] [ 18610: 18610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.505989 249972 task_exit.go:204] [ 18610: 18610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.506093 249972 task_signals.go:204] [ 18610: 18611] Signal 18610, PID: 18611, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.506163 249972 task_exit.go:204] [ 18610: 18611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.507888 249972 task_exit.go:204] [ 18610: 18611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.507917 249972 task_exit.go:204] [ 18610: 18611] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.507936 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.508740 249972 task_exit.go:204] [ 18610: 18610] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) D0323 21:16:54.510779 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.510979 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.526333 249972 usertrap_amd64.go:212] [ 18612: 18612] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.526401 249972 usertrap_amd64.go:122] [ 18612: 18612] Allocate a new trap: 0xc007c41290 39 D0323 21:16:54.527048 249972 usertrap_amd64.go:225] [ 18612: 18612] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.528305 249972 usertrap_amd64.go:212] [ 18612: 18612] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.528336 249972 usertrap_amd64.go:122] [ 18612: 18612] Allocate a new trap: 0xc007c41290 40 D0323 21:16:54.528349 249972 usertrap_amd64.go:225] [ 18612: 18612] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.529146 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.529426 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.534607 249972 usertrap_amd64.go:212] [ 18612: 18612] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.534635 249972 usertrap_amd64.go:122] [ 18612: 18612] Allocate a new trap: 0xc007c41290 41 D0323 21:16:54.534646 249972 usertrap_amd64.go:225] [ 18612: 18612] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.544441 249972 usertrap_amd64.go:212] [ 18612: 18612] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.544474 249972 usertrap_amd64.go:122] [ 18612: 18612] Allocate a new trap: 0xc007c41290 42 D0323 21:16:54.544488 249972 usertrap_amd64.go:225] [ 18612: 18612] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.544971 249972 task_exit.go:204] [ 18612: 18612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.545010 249972 task_exit.go:204] [ 18612: 18612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.545134 249972 task_signals.go:204] [ 18612: 18613] Signal 18612, PID: 18613, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.545179 249972 task_exit.go:204] [ 18612: 18613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.546759 249972 task_exit.go:204] [ 18612: 18613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.546839 249972 task_exit.go:204] [ 18612: 18613] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.546866 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.547673 249972 task_exit.go:204] [ 18612: 18612] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights], 0x10}, 0x405) D0323 21:16:54.549498 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.549686 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.574775 249972 usertrap_amd64.go:212] [ 18614: 18614] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.574819 249972 usertrap_amd64.go:122] [ 18614: 18614] Allocate a new trap: 0xc00b2f1c50 39 D0323 21:16:54.574941 249972 usertrap_amd64.go:225] [ 18614: 18614] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.577542 249972 usertrap_amd64.go:212] [ 18614: 18614] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.577573 249972 usertrap_amd64.go:122] [ 18614: 18614] Allocate a new trap: 0xc00b2f1c50 40 D0323 21:16:54.577587 249972 usertrap_amd64.go:225] [ 18614: 18614] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.578588 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.578769 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.585694 249972 usertrap_amd64.go:212] [ 18614: 18614] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.585749 249972 usertrap_amd64.go:122] [ 18614: 18614] Allocate a new trap: 0xc00b2f1c50 41 D0323 21:16:54.585774 249972 usertrap_amd64.go:225] [ 18614: 18614] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.592219 249972 usertrap_amd64.go:212] [ 18614: 18614] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.592260 249972 usertrap_amd64.go:122] [ 18614: 18614] Allocate a new trap: 0xc00b2f1c50 42 D0323 21:16:54.592276 249972 usertrap_amd64.go:225] [ 18614: 18614] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.592883 249972 task_exit.go:204] [ 18614: 18614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.592971 249972 task_signals.go:204] [ 18614: 18615] Signal 18614, PID: 18615, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.593005 249972 task_exit.go:204] [ 18614: 18614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.593056 249972 task_exit.go:204] [ 18614: 18615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.597390 249972 task_exit.go:204] [ 18614: 18615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.597420 249972 task_exit.go:204] [ 18614: 18615] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.597432 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.598519 249972 task_exit.go:204] [ 18614: 18614] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000380)='.\x00', 0x0) D0323 21:16:54.599419 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.599709 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.604438 249972 usertrap_amd64.go:212] [ 18616: 18616] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.604486 249972 usertrap_amd64.go:122] [ 18616: 18616] Allocate a new trap: 0xc00b2f0180 39 D0323 21:16:54.604566 249972 usertrap_amd64.go:225] [ 18616: 18616] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.605448 249972 usertrap_amd64.go:212] [ 18616: 18616] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.605472 249972 usertrap_amd64.go:122] [ 18616: 18616] Allocate a new trap: 0xc00b2f0180 40 D0323 21:16:54.605483 249972 usertrap_amd64.go:225] [ 18616: 18616] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.605856 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.606316 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.608624 249972 usertrap_amd64.go:212] [ 18616: 18616] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.608650 249972 usertrap_amd64.go:122] [ 18616: 18616] Allocate a new trap: 0xc00b2f0180 41 D0323 21:16:54.608660 249972 usertrap_amd64.go:225] [ 18616: 18616] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.616893 249972 usertrap_amd64.go:212] [ 18616: 18616] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.616928 249972 usertrap_amd64.go:122] [ 18616: 18616] Allocate a new trap: 0xc00b2f0180 42 D0323 21:16:54.616983 249972 usertrap_amd64.go:225] [ 18616: 18616] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.617349 249972 task_exit.go:204] [ 18616: 18616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.617381 249972 task_exit.go:204] [ 18616: 18616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.617469 249972 task_signals.go:204] [ 18616: 18617] Signal 18616, PID: 18617, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.617498 249972 task_exit.go:204] [ 18616: 18617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.618975 249972 task_exit.go:204] [ 18616: 18617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.619008 249972 task_exit.go:204] [ 18616: 18617] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.619029 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.619750 249972 task_exit.go:204] [ 18616: 18616] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000001200)='./file0\x00', 0x1000, 0x3) D0323 21:16:54.622800 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.622948 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.630093 249972 usertrap_amd64.go:212] [ 18618: 18618] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.630133 249972 usertrap_amd64.go:122] [ 18618: 18618] Allocate a new trap: 0xc0087be150 39 D0323 21:16:54.630260 249972 usertrap_amd64.go:225] [ 18618: 18618] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.630733 249972 usertrap_amd64.go:212] [ 18618: 18618] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.630758 249972 usertrap_amd64.go:122] [ 18618: 18618] Allocate a new trap: 0xc0087be150 40 D0323 21:16:54.630772 249972 usertrap_amd64.go:225] [ 18618: 18618] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.631177 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.631596 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.634675 249972 usertrap_amd64.go:212] [ 18618: 18618] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.634747 249972 usertrap_amd64.go:122] [ 18618: 18618] Allocate a new trap: 0xc0087be150 41 D0323 21:16:54.634778 249972 usertrap_amd64.go:225] [ 18618: 18618] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.643264 249972 usertrap_amd64.go:212] [ 18618: 18618] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.643313 249972 usertrap_amd64.go:122] [ 18618: 18618] Allocate a new trap: 0xc0087be150 42 D0323 21:16:54.643323 249972 usertrap_amd64.go:225] [ 18618: 18618] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.643638 249972 task_exit.go:204] [ 18618: 18618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.643661 249972 task_exit.go:204] [ 18618: 18618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.643919 249972 task_signals.go:204] [ 18618: 18619] Signal 18618, PID: 18619, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.643955 249972 task_exit.go:204] [ 18618: 18619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.647118 249972 task_exit.go:204] [ 18618: 18619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.647155 249972 task_exit.go:204] [ 18618: 18619] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.647173 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.647897 249972 task_exit.go:204] [ 18618: 18618] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: setitimer(0x0, &(0x7f0000000040), 0x0) D0323 21:16:54.649112 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.649262 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.659946 249972 usertrap_amd64.go:212] [ 18620: 18620] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.659970 249972 usertrap_amd64.go:122] [ 18620: 18620] Allocate a new trap: 0xc003c30150 39 D0323 21:16:54.660068 249972 usertrap_amd64.go:225] [ 18620: 18620] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.660703 249972 usertrap_amd64.go:212] [ 18620: 18620] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.660723 249972 usertrap_amd64.go:122] [ 18620: 18620] Allocate a new trap: 0xc003c30150 40 D0323 21:16:54.660731 249972 usertrap_amd64.go:225] [ 18620: 18620] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.661418 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.661606 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.663843 249972 usertrap_amd64.go:212] [ 18620: 18620] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.663869 249972 usertrap_amd64.go:122] [ 18620: 18620] Allocate a new trap: 0xc003c30150 41 D0323 21:16:54.663881 249972 usertrap_amd64.go:225] [ 18620: 18620] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.671512 249972 usertrap_amd64.go:212] [ 18620: 18620] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.671536 249972 usertrap_amd64.go:122] [ 18620: 18620] Allocate a new trap: 0xc003c30150 42 D0323 21:16:54.671544 249972 usertrap_amd64.go:225] [ 18620: 18620] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.671993 249972 task_exit.go:204] [ 18620: 18620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.672024 249972 task_exit.go:204] [ 18620: 18620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.672153 249972 task_signals.go:204] [ 18620: 18621] Signal 18620, PID: 18621, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.672188 249972 task_exit.go:204] [ 18620: 18621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.673361 249972 task_exit.go:204] [ 18620: 18621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.673394 249972 task_exit.go:204] [ 18620: 18621] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.673412 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.674473 249972 task_exit.go:204] [ 18620: 18620] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) D0323 21:16:54.677363 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.677510 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.685876 249972 usertrap_amd64.go:212] [ 18622: 18622] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.685901 249972 usertrap_amd64.go:122] [ 18622: 18622] Allocate a new trap: 0xc003c30210 39 D0323 21:16:54.686024 249972 usertrap_amd64.go:225] [ 18622: 18622] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.686483 249972 usertrap_amd64.go:212] [ 18622: 18622] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.686508 249972 usertrap_amd64.go:122] [ 18622: 18622] Allocate a new trap: 0xc003c30210 40 D0323 21:16:54.686519 249972 usertrap_amd64.go:225] [ 18622: 18622] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.687178 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.687519 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.690047 249972 usertrap_amd64.go:212] [ 18622: 18622] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.690075 249972 usertrap_amd64.go:122] [ 18622: 18622] Allocate a new trap: 0xc003c30210 41 D0323 21:16:54.690117 249972 usertrap_amd64.go:225] [ 18622: 18622] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.710969 249972 usertrap_amd64.go:212] [ 18622: 18622] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.710998 249972 usertrap_amd64.go:122] [ 18622: 18622] Allocate a new trap: 0xc003c30210 42 D0323 21:16:54.711010 249972 usertrap_amd64.go:225] [ 18622: 18622] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.711405 249972 task_exit.go:204] [ 18622: 18622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.711472 249972 task_exit.go:204] [ 18622: 18622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.711568 249972 task_signals.go:204] [ 18622: 18623] Signal 18622, PID: 18623, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.711592 249972 task_exit.go:204] [ 18622: 18623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.713558 249972 task_exit.go:204] [ 18622: 18623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.713624 249972 task_exit.go:204] [ 18622: 18623] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.713650 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.714522 249972 task_exit.go:204] [ 18622: 18622] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f0000000400)=[{0x0}], 0x1) D0323 21:16:54.715886 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.716046 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.723639 249972 usertrap_amd64.go:212] [ 18624: 18624] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.723696 249972 usertrap_amd64.go:122] [ 18624: 18624] Allocate a new trap: 0xc003c30390 39 D0323 21:16:54.723768 249972 usertrap_amd64.go:225] [ 18624: 18624] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.724205 249972 usertrap_amd64.go:212] [ 18624: 18624] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.724232 249972 usertrap_amd64.go:122] [ 18624: 18624] Allocate a new trap: 0xc003c30390 40 D0323 21:16:54.724242 249972 usertrap_amd64.go:225] [ 18624: 18624] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.725007 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.725178 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.727682 249972 usertrap_amd64.go:212] [ 18624: 18624] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.727708 249972 usertrap_amd64.go:122] [ 18624: 18624] Allocate a new trap: 0xc003c30390 41 D0323 21:16:54.727719 249972 usertrap_amd64.go:225] [ 18624: 18624] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.734625 249972 usertrap_amd64.go:212] [ 18624: 18624] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.734651 249972 usertrap_amd64.go:122] [ 18624: 18624] Allocate a new trap: 0xc003c30390 42 D0323 21:16:54.734662 249972 usertrap_amd64.go:225] [ 18624: 18624] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.735336 249972 task_exit.go:204] [ 18624: 18624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.735409 249972 task_exit.go:204] [ 18624: 18624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.735513 249972 task_signals.go:204] [ 18624: 18625] Signal 18624, PID: 18625, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.735541 249972 task_exit.go:204] [ 18624: 18625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.737858 249972 task_exit.go:204] [ 18624: 18625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.737875 249972 task_exit.go:204] [ 18624: 18625] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.737890 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.741059 249972 task_exit.go:204] [ 18624: 18624] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) D0323 21:16:54.749354 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.749516 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.758432 249972 usertrap_amd64.go:212] [ 18626: 18626] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.758465 249972 usertrap_amd64.go:122] [ 18626: 18626] Allocate a new trap: 0xc003c30480 39 D0323 21:16:54.758566 249972 usertrap_amd64.go:225] [ 18626: 18626] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.759412 249972 usertrap_amd64.go:212] [ 18626: 18626] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.759444 249972 usertrap_amd64.go:122] [ 18626: 18626] Allocate a new trap: 0xc003c30480 40 D0323 21:16:54.759458 249972 usertrap_amd64.go:225] [ 18626: 18626] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.759921 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.760118 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.763217 249972 usertrap_amd64.go:212] [ 18626: 18626] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.763244 249972 usertrap_amd64.go:122] [ 18626: 18626] Allocate a new trap: 0xc003c30480 41 D0323 21:16:54.763259 249972 usertrap_amd64.go:225] [ 18626: 18626] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.770897 249972 usertrap_amd64.go:212] [ 18626: 18626] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.770927 249972 usertrap_amd64.go:122] [ 18626: 18626] Allocate a new trap: 0xc003c30480 42 D0323 21:16:54.770960 249972 usertrap_amd64.go:225] [ 18626: 18626] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.771302 249972 task_exit.go:204] [ 18626: 18626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.771398 249972 task_exit.go:204] [ 18626: 18626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.771484 249972 task_signals.go:204] [ 18626: 18627] Signal 18626, PID: 18627, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.771513 249972 task_exit.go:204] [ 18626: 18627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.773208 249972 task_exit.go:204] [ 18626: 18627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.773239 249972 task_exit.go:204] [ 18626: 18627] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.773252 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.773388 249972 task_exit.go:204] [ 18626: 18626] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000400), 0x10, 0x2, 0x0) D0323 21:16:54.775347 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.775484 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.784171 249972 usertrap_amd64.go:212] [ 18628: 18628] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.784193 249972 usertrap_amd64.go:122] [ 18628: 18628] Allocate a new trap: 0xc009026270 39 D0323 21:16:54.784300 249972 usertrap_amd64.go:225] [ 18628: 18628] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.785152 249972 usertrap_amd64.go:212] [ 18628: 18628] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.785183 249972 usertrap_amd64.go:122] [ 18628: 18628] Allocate a new trap: 0xc009026270 40 D0323 21:16:54.785196 249972 usertrap_amd64.go:225] [ 18628: 18628] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.785531 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.785709 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.787858 249972 usertrap_amd64.go:212] [ 18628: 18628] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.787881 249972 usertrap_amd64.go:122] [ 18628: 18628] Allocate a new trap: 0xc009026270 41 D0323 21:16:54.787894 249972 usertrap_amd64.go:225] [ 18628: 18628] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.797115 249972 usertrap_amd64.go:212] [ 18628: 18628] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.797143 249972 usertrap_amd64.go:122] [ 18628: 18628] Allocate a new trap: 0xc009026270 42 D0323 21:16:54.797157 249972 usertrap_amd64.go:225] [ 18628: 18628] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.797467 249972 task_exit.go:204] [ 18628: 18628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.797496 249972 task_exit.go:204] [ 18628: 18628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.797559 249972 task_signals.go:204] [ 18628: 18629] Signal 18628, PID: 18629, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.797586 249972 task_exit.go:204] [ 18628: 18629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.801176 249972 task_exit.go:204] [ 18628: 18629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.801260 249972 task_exit.go:204] [ 18628: 18629] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.801294 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.802073 249972 task_exit.go:204] [ 18628: 18628] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.803642 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.804075 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:54 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) fchownat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) D0323 21:16:54.819531 249972 usertrap_amd64.go:212] [ 18630: 18630] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.819550 249972 usertrap_amd64.go:122] [ 18630: 18630] Allocate a new trap: 0xc0090265a0 39 D0323 21:16:54.819602 249972 usertrap_amd64.go:225] [ 18630: 18630] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.820211 249972 usertrap_amd64.go:212] [ 18630: 18630] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.820226 249972 usertrap_amd64.go:122] [ 18630: 18630] Allocate a new trap: 0xc0090265a0 40 D0323 21:16:54.820237 249972 usertrap_amd64.go:225] [ 18630: 18630] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.820878 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.821090 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.823857 249972 usertrap_amd64.go:212] [ 18630: 18630] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.823875 249972 usertrap_amd64.go:122] [ 18630: 18630] Allocate a new trap: 0xc0090265a0 41 D0323 21:16:54.823887 249972 usertrap_amd64.go:225] [ 18630: 18630] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.834845 249972 usertrap_amd64.go:212] [ 18630: 18630] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.834872 249972 usertrap_amd64.go:122] [ 18630: 18630] Allocate a new trap: 0xc0090265a0 42 D0323 21:16:54.834882 249972 usertrap_amd64.go:225] [ 18630: 18630] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.835112 249972 task_exit.go:204] [ 18630: 18630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.835142 249972 task_exit.go:204] [ 18630: 18630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.835201 249972 task_signals.go:204] [ 18630: 18631] Signal 18630, PID: 18631, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.835226 249972 task_exit.go:204] [ 18630: 18631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.836443 249972 task_exit.go:204] [ 18630: 18631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.836478 249972 task_exit.go:204] [ 18630: 18631] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.836496 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.838116 249972 task_exit.go:204] [ 18630: 18630] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: mmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x10, 0xffffffffffffffff, 0x0) D0323 21:16:54.841899 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.842063 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.851158 249972 usertrap_amd64.go:212] [ 18632: 18632] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.851191 249972 usertrap_amd64.go:122] [ 18632: 18632] Allocate a new trap: 0xc00b2f0810 39 D0323 21:16:54.851269 249972 usertrap_amd64.go:225] [ 18632: 18632] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.851885 249972 usertrap_amd64.go:212] [ 18632: 18632] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.851911 249972 usertrap_amd64.go:122] [ 18632: 18632] Allocate a new trap: 0xc00b2f0810 40 D0323 21:16:54.851921 249972 usertrap_amd64.go:225] [ 18632: 18632] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.852418 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.852780 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.855718 249972 usertrap_amd64.go:212] [ 18632: 18632] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.855745 249972 usertrap_amd64.go:122] [ 18632: 18632] Allocate a new trap: 0xc00b2f0810 41 D0323 21:16:54.855756 249972 usertrap_amd64.go:225] [ 18632: 18632] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.861753 249972 usertrap_amd64.go:212] [ 18632: 18632] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.861782 249972 usertrap_amd64.go:122] [ 18632: 18632] Allocate a new trap: 0xc00b2f0810 42 D0323 21:16:54.861795 249972 usertrap_amd64.go:225] [ 18632: 18632] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.862111 249972 task_exit.go:204] [ 18632: 18632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.862144 249972 task_exit.go:204] [ 18632: 18632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.862241 249972 task_signals.go:204] [ 18632: 18633] Signal 18632, PID: 18633, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.862266 249972 task_exit.go:204] [ 18632: 18633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.863602 249972 task_exit.go:204] [ 18632: 18633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.863625 249972 task_exit.go:204] [ 18632: 18633] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.863635 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.864714 249972 task_exit.go:204] [ 18632: 18632] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) D0323 21:16:54.866481 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.866621 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.885302 249972 usertrap_amd64.go:212] [ 18634: 18634] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.885339 249972 usertrap_amd64.go:122] [ 18634: 18634] Allocate a new trap: 0xc00a424270 39 D0323 21:16:54.885435 249972 usertrap_amd64.go:225] [ 18634: 18634] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.886050 249972 usertrap_amd64.go:212] [ 18634: 18634] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.886073 249972 usertrap_amd64.go:122] [ 18634: 18634] Allocate a new trap: 0xc00a424270 40 D0323 21:16:54.886081 249972 usertrap_amd64.go:225] [ 18634: 18634] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.886434 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.886680 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.901812 249972 usertrap_amd64.go:212] [ 18634: 18634] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.901848 249972 usertrap_amd64.go:122] [ 18634: 18634] Allocate a new trap: 0xc00a424270 41 D0323 21:16:54.901862 249972 usertrap_amd64.go:225] [ 18634: 18634] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.910852 249972 usertrap_amd64.go:212] [ 18634: 18634] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.910891 249972 usertrap_amd64.go:122] [ 18634: 18634] Allocate a new trap: 0xc00a424270 42 D0323 21:16:54.910905 249972 usertrap_amd64.go:225] [ 18634: 18634] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.911394 249972 task_exit.go:204] [ 18634: 18634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.911435 249972 task_exit.go:204] [ 18634: 18634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.911520 249972 task_signals.go:204] [ 18634: 18635] Signal 18634, PID: 18635, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.911545 249972 task_exit.go:204] [ 18634: 18635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.912978 249972 task_exit.go:204] [ 18634: 18635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.913000 249972 task_exit.go:204] [ 18634: 18635] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.913020 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.913466 249972 task_exit.go:204] [ 18634: 18634] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: syz_clone(0x309a8580, 0x0, 0x0, 0x0, 0x0, 0x0) D0323 21:16:54.915545 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.915771 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.926171 249972 usertrap_amd64.go:212] [ 18636: 18636] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.926206 249972 usertrap_amd64.go:122] [ 18636: 18636] Allocate a new trap: 0xc008f8c210 39 D0323 21:16:54.926301 249972 usertrap_amd64.go:225] [ 18636: 18636] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.926995 249972 usertrap_amd64.go:212] [ 18636: 18636] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.927020 249972 usertrap_amd64.go:122] [ 18636: 18636] Allocate a new trap: 0xc008f8c210 40 D0323 21:16:54.927035 249972 usertrap_amd64.go:225] [ 18636: 18636] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.928393 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.928593 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.932856 249972 usertrap_amd64.go:212] [ 18636: 18636] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.932878 249972 usertrap_amd64.go:122] [ 18636: 18636] Allocate a new trap: 0xc008f8c210 41 D0323 21:16:54.932890 249972 usertrap_amd64.go:225] [ 18636: 18636] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.940848 249972 usertrap_amd64.go:212] [ 18636: 18636] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.940878 249972 usertrap_amd64.go:122] [ 18636: 18636] Allocate a new trap: 0xc008f8c210 42 D0323 21:16:54.940892 249972 usertrap_amd64.go:225] [ 18636: 18636] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.941219 249972 task_exit.go:204] [ 18636: 18636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.941246 249972 task_exit.go:204] [ 18636: 18636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.941335 249972 task_signals.go:204] [ 18636: 18637] Signal 18636, PID: 18637, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.941369 249972 task_exit.go:204] [ 18636: 18637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.942710 249972 task_exit.go:204] [ 18636: 18637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.942732 249972 task_exit.go:204] [ 18636: 18637] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.942742 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.944162 249972 task_exit.go:204] [ 18636: 18636] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000100), 0x4) D0323 21:16:54.945441 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.945595 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.959879 249972 usertrap_amd64.go:212] [ 18638: 18638] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.959946 249972 usertrap_amd64.go:122] [ 18638: 18638] Allocate a new trap: 0xc008102330 39 D0323 21:16:54.960068 249972 usertrap_amd64.go:225] [ 18638: 18638] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.961144 249972 usertrap_amd64.go:212] [ 18638: 18638] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.961172 249972 usertrap_amd64.go:122] [ 18638: 18638] Allocate a new trap: 0xc008102330 40 D0323 21:16:54.961181 249972 usertrap_amd64.go:225] [ 18638: 18638] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.961716 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.961829 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.965307 249972 usertrap_amd64.go:212] [ 18638: 18638] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.965356 249972 usertrap_amd64.go:122] [ 18638: 18638] Allocate a new trap: 0xc008102330 41 D0323 21:16:54.965369 249972 usertrap_amd64.go:225] [ 18638: 18638] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:54.972342 249972 usertrap_amd64.go:212] [ 18638: 18638] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:54.972372 249972 usertrap_amd64.go:122] [ 18638: 18638] Allocate a new trap: 0xc008102330 42 D0323 21:16:54.972386 249972 usertrap_amd64.go:225] [ 18638: 18638] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:54.972912 249972 task_exit.go:204] [ 18638: 18638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.972979 249972 task_exit.go:204] [ 18638: 18638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.973004 249972 task_signals.go:204] [ 18638: 18639] Signal 18638, PID: 18639, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:54.973026 249972 task_exit.go:204] [ 18638: 18639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:54.975060 249972 task_exit.go:204] [ 18638: 18639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:54.975190 249972 task_exit.go:204] [ 18638: 18639] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:54.975223 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:54.975588 249972 task_exit.go:204] [ 18638: 18638] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:54 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) D0323 21:16:54.977712 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:54.977837 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.990577 249972 usertrap_amd64.go:212] [ 18640: 18640] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:54.990592 249972 usertrap_amd64.go:122] [ 18640: 18640] Allocate a new trap: 0xc0081023f0 39 D0323 21:16:54.990679 249972 usertrap_amd64.go:225] [ 18640: 18640] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:54.991199 249972 usertrap_amd64.go:212] [ 18640: 18640] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:54.991226 249972 usertrap_amd64.go:122] [ 18640: 18640] Allocate a new trap: 0xc0081023f0 40 D0323 21:16:54.991240 249972 usertrap_amd64.go:225] [ 18640: 18640] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:54.991619 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:54.991708 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:54.994874 249972 usertrap_amd64.go:212] [ 18640: 18640] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:54.994949 249972 usertrap_amd64.go:122] [ 18640: 18640] Allocate a new trap: 0xc0081023f0 41 D0323 21:16:54.995015 249972 usertrap_amd64.go:225] [ 18640: 18640] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.008993 249972 usertrap_amd64.go:212] [ 18640: 18640] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.009041 249972 usertrap_amd64.go:122] [ 18640: 18640] Allocate a new trap: 0xc0081023f0 42 D0323 21:16:55.009058 249972 usertrap_amd64.go:225] [ 18640: 18640] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.009496 249972 task_exit.go:204] [ 18640: 18640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.009554 249972 task_exit.go:204] [ 18640: 18640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.009602 249972 task_signals.go:204] [ 18640: 18641] Signal 18640, PID: 18641, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.009626 249972 task_exit.go:204] [ 18640: 18641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.011273 249972 task_exit.go:204] [ 18640: 18641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.011303 249972 task_exit.go:204] [ 18640: 18641] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.011320 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.013827 249972 task_exit.go:204] [ 18640: 18640] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: getgroups(0x7, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) setregid(r0, 0x0) D0323 21:16:55.015391 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.015582 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.025063 249972 usertrap_amd64.go:212] [ 18642: 18642] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.025098 249972 usertrap_amd64.go:122] [ 18642: 18642] Allocate a new trap: 0xc009026ab0 39 D0323 21:16:55.025207 249972 usertrap_amd64.go:225] [ 18642: 18642] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.026164 249972 usertrap_amd64.go:212] [ 18642: 18642] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.026206 249972 usertrap_amd64.go:122] [ 18642: 18642] Allocate a new trap: 0xc009026ab0 40 D0323 21:16:55.026221 249972 usertrap_amd64.go:225] [ 18642: 18642] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.026769 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.026962 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.034071 249972 usertrap_amd64.go:212] [ 18642: 18642] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.034096 249972 usertrap_amd64.go:122] [ 18642: 18642] Allocate a new trap: 0xc009026ab0 41 D0323 21:16:55.034112 249972 usertrap_amd64.go:225] [ 18642: 18642] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.043406 249972 usertrap_amd64.go:212] [ 18642: 18642] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.043437 249972 usertrap_amd64.go:122] [ 18642: 18642] Allocate a new trap: 0xc009026ab0 42 D0323 21:16:55.043451 249972 usertrap_amd64.go:225] [ 18642: 18642] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.045225 249972 task_exit.go:204] [ 18642: 18642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.045291 249972 task_exit.go:204] [ 18642: 18642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.045462 249972 task_signals.go:204] [ 18642: 18643] Signal 18642, PID: 18643, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.045499 249972 task_exit.go:204] [ 18642: 18643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.048370 249972 task_exit.go:204] [ 18642: 18643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.048510 249972 task_exit.go:204] [ 18642: 18643] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.048540 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.049046 249972 task_exit.go:204] [ 18642: 18642] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000002240)={'a', ' *:* ', 'w\x00'}, 0x8) D0323 21:16:55.051146 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.051291 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.061060 249972 usertrap_amd64.go:212] [ 18644: 18644] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.061106 249972 usertrap_amd64.go:122] [ 18644: 18644] Allocate a new trap: 0xc008f8c4b0 39 D0323 21:16:55.061188 249972 usertrap_amd64.go:225] [ 18644: 18644] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.061721 249972 usertrap_amd64.go:212] [ 18644: 18644] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.061744 249972 usertrap_amd64.go:122] [ 18644: 18644] Allocate a new trap: 0xc008f8c4b0 40 D0323 21:16:55.061758 249972 usertrap_amd64.go:225] [ 18644: 18644] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.062496 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.062716 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.067656 249972 usertrap_amd64.go:212] [ 18644: 18644] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.067684 249972 usertrap_amd64.go:122] [ 18644: 18644] Allocate a new trap: 0xc008f8c4b0 41 D0323 21:16:55.067716 249972 usertrap_amd64.go:225] [ 18644: 18644] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.076496 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: []} D0323 21:16:55.076702 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.076728 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [syzcgroup, net, syz0]} D0323 21:16:55.076821 249972 client.go:400] recv [channel 0xc0007b4000] WalkResp{Status: ComponentDoesNotExist, Inodes: []} D0323 21:16:55.078898 249972 usertrap_amd64.go:212] [ 18644: 18644] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.078968 249972 usertrap_amd64.go:122] [ 18644: 18644] Allocate a new trap: 0xc008f8c4b0 42 D0323 21:16:55.078994 249972 usertrap_amd64.go:225] [ 18644: 18644] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.079424 249972 task_exit.go:204] [ 18644: 18644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.079461 249972 task_exit.go:204] [ 18644: 18644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.079521 249972 task_signals.go:204] [ 18644: 18645] Signal 18644, PID: 18645, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.079554 249972 task_exit.go:204] [ 18644: 18645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.081066 249972 task_exit.go:204] [ 18644: 18645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.081093 249972 task_exit.go:204] [ 18644: 18645] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.081112 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.082180 249972 task_exit.go:204] [ 18644: 18644] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000080)="eaef125c00000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000240)="ea00000100000000", 0x8) D0323 21:16:55.083825 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.084042 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.093581 249972 usertrap_amd64.go:212] [ 18646: 18646] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.093611 249972 usertrap_amd64.go:122] [ 18646: 18646] Allocate a new trap: 0xc00b2f0de0 39 D0323 21:16:55.093693 249972 usertrap_amd64.go:225] [ 18646: 18646] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.094309 249972 usertrap_amd64.go:212] [ 18646: 18646] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.094333 249972 usertrap_amd64.go:122] [ 18646: 18646] Allocate a new trap: 0xc00b2f0de0 40 D0323 21:16:55.094366 249972 usertrap_amd64.go:225] [ 18646: 18646] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.094898 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.095145 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.099408 249972 usertrap_amd64.go:212] [ 18646: 18646] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.099437 249972 usertrap_amd64.go:122] [ 18646: 18646] Allocate a new trap: 0xc00b2f0de0 41 D0323 21:16:55.099448 249972 usertrap_amd64.go:225] [ 18646: 18646] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.107598 249972 usertrap_amd64.go:212] [ 18646: 18646] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.107627 249972 usertrap_amd64.go:122] [ 18646: 18646] Allocate a new trap: 0xc00b2f0de0 42 D0323 21:16:55.107639 249972 usertrap_amd64.go:225] [ 18646: 18646] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.107881 249972 task_exit.go:204] [ 18646: 18646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.107916 249972 task_signals.go:204] [ 18646: 18647] Signal 18646, PID: 18647, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.107943 249972 task_exit.go:204] [ 18646: 18646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.107995 249972 task_exit.go:204] [ 18646: 18647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.111774 249972 task_exit.go:204] [ 18646: 18647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.111801 249972 task_exit.go:204] [ 18646: 18647] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.111813 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.112630 249972 task_exit.go:204] [ 18646: 18646] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') D0323 21:16:55.118605 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.118862 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.129751 249972 usertrap_amd64.go:212] [ 18648: 18648] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.129802 249972 usertrap_amd64.go:122] [ 18648: 18648] Allocate a new trap: 0xc008f8c990 39 D0323 21:16:55.129939 249972 usertrap_amd64.go:225] [ 18648: 18648] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.130573 249972 usertrap_amd64.go:212] [ 18648: 18648] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.130598 249972 usertrap_amd64.go:122] [ 18648: 18648] Allocate a new trap: 0xc008f8c990 40 D0323 21:16:55.130607 249972 usertrap_amd64.go:225] [ 18648: 18648] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.131109 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.131358 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.135079 249972 usertrap_amd64.go:212] [ 18648: 18648] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.135146 249972 usertrap_amd64.go:122] [ 18648: 18648] Allocate a new trap: 0xc008f8c990 41 D0323 21:16:55.135170 249972 usertrap_amd64.go:225] [ 18648: 18648] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.142322 249972 usertrap_amd64.go:212] [ 18648: 18648] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.142372 249972 usertrap_amd64.go:122] [ 18648: 18648] Allocate a new trap: 0xc008f8c990 42 D0323 21:16:55.142392 249972 usertrap_amd64.go:225] [ 18648: 18648] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.143285 249972 task_exit.go:204] [ 18648: 18648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.143314 249972 task_exit.go:204] [ 18648: 18648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.143389 249972 task_signals.go:204] [ 18648: 18649] Signal 18648, PID: 18649, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.143425 249972 task_exit.go:204] [ 18648: 18649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.145341 249972 task_exit.go:204] [ 18648: 18649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.145359 249972 task_exit.go:204] [ 18648: 18649] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.145374 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.145525 249972 task_exit.go:204] [ 18648: 18648] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) D0323 21:16:55.147367 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.147802 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.158173 249972 usertrap_amd64.go:212] [ 18650: 18650] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.158240 249972 usertrap_amd64.go:122] [ 18650: 18650] Allocate a new trap: 0xc008102750 39 D0323 21:16:55.158339 249972 usertrap_amd64.go:225] [ 18650: 18650] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.159410 249972 usertrap_amd64.go:212] [ 18650: 18650] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.159425 249972 usertrap_amd64.go:122] [ 18650: 18650] Allocate a new trap: 0xc008102750 40 D0323 21:16:55.159435 249972 usertrap_amd64.go:225] [ 18650: 18650] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.160171 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.160360 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.166328 249972 usertrap_amd64.go:212] [ 18650: 18650] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.166375 249972 usertrap_amd64.go:122] [ 18650: 18650] Allocate a new trap: 0xc008102750 41 D0323 21:16:55.166391 249972 usertrap_amd64.go:225] [ 18650: 18650] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.176483 249972 usertrap_amd64.go:212] [ 18650: 18650] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.176511 249972 usertrap_amd64.go:122] [ 18650: 18650] Allocate a new trap: 0xc008102750 42 D0323 21:16:55.176525 249972 usertrap_amd64.go:225] [ 18650: 18650] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.176868 249972 task_exit.go:204] [ 18650: 18650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.176898 249972 task_exit.go:204] [ 18650: 18650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.176985 249972 task_signals.go:204] [ 18650: 18651] Signal 18650, PID: 18651, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.177002 249972 task_exit.go:204] [ 18650: 18651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.181039 249972 task_exit.go:204] [ 18650: 18651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.181076 249972 task_exit.go:204] [ 18650: 18651] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.181091 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.181857 249972 task_exit.go:204] [ 18650: 18650] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={&(0x7f0000000300), 0xe}, 0x484a, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) D0323 21:16:55.184897 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.185110 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.193800 249972 usertrap_amd64.go:212] [ 18652: 18652] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.193824 249972 usertrap_amd64.go:122] [ 18652: 18652] Allocate a new trap: 0xc008102810 39 D0323 21:16:55.193941 249972 usertrap_amd64.go:225] [ 18652: 18652] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.194378 249972 usertrap_amd64.go:212] [ 18652: 18652] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.194399 249972 usertrap_amd64.go:122] [ 18652: 18652] Allocate a new trap: 0xc008102810 40 D0323 21:16:55.194416 249972 usertrap_amd64.go:225] [ 18652: 18652] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.194855 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.195112 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.197753 249972 usertrap_amd64.go:212] [ 18652: 18652] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.197780 249972 usertrap_amd64.go:122] [ 18652: 18652] Allocate a new trap: 0xc008102810 41 D0323 21:16:55.197789 249972 usertrap_amd64.go:225] [ 18652: 18652] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.206150 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.206557 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.217826 249972 usertrap_amd64.go:212] [ 18652: 18652] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.217899 249972 usertrap_amd64.go:122] [ 18652: 18652] Allocate a new trap: 0xc008102810 42 D0323 21:16:55.217939 249972 usertrap_amd64.go:225] [ 18652: 18652] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.218183 249972 task_exit.go:204] [ 18652: 18652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.218221 249972 task_exit.go:204] [ 18652: 18652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.218255 249972 task_signals.go:204] [ 18652: 18653] Signal 18652, PID: 18653, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.218295 249972 task_exit.go:204] [ 18652: 18653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.220417 249972 task_exit.go:204] [ 18652: 18653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.220458 249972 task_exit.go:204] [ 18652: 18653] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.220485 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.225764 249972 task_exit.go:204] [ 18652: 18652] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.227000 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:55 executing program 0: semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000009c0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) D0323 21:16:55.227801 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.243473 249972 usertrap_amd64.go:212] [ 18654: 18654] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.243559 249972 usertrap_amd64.go:122] [ 18654: 18654] Allocate a new trap: 0xc008102870 39 D0323 21:16:55.243667 249972 usertrap_amd64.go:225] [ 18654: 18654] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.243972 249972 usertrap_amd64.go:212] [ 18654: 18654] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.244019 249972 usertrap_amd64.go:122] [ 18654: 18654] Allocate a new trap: 0xc008102870 40 D0323 21:16:55.244046 249972 usertrap_amd64.go:225] [ 18654: 18654] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.244683 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.244858 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.247781 249972 usertrap_amd64.go:212] [ 18654: 18654] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.247806 249972 usertrap_amd64.go:122] [ 18654: 18654] Allocate a new trap: 0xc008102870 41 D0323 21:16:55.247820 249972 usertrap_amd64.go:225] [ 18654: 18654] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.252787 249972 usertrap_amd64.go:212] [ 18654: 18654] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.252815 249972 usertrap_amd64.go:122] [ 18654: 18654] Allocate a new trap: 0xc008102870 42 D0323 21:16:55.252829 249972 usertrap_amd64.go:225] [ 18654: 18654] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.253293 249972 task_exit.go:204] [ 18654: 18654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.253340 249972 task_exit.go:204] [ 18654: 18654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.253409 249972 task_signals.go:204] [ 18654: 18655] Signal 18654, PID: 18655, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.253440 249972 task_exit.go:204] [ 18654: 18655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.255000 249972 task_exit.go:204] [ 18654: 18655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.255045 249972 task_exit.go:204] [ 18654: 18655] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.255061 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.255227 249972 task_exit.go:204] [ 18654: 18654] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: pipe2(0x0, 0x0) pipe2(&(0x7f0000000ac0), 0x0) D0323 21:16:55.257187 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.257329 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.266751 249972 usertrap_amd64.go:212] [ 18656: 18656] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.266780 249972 usertrap_amd64.go:122] [ 18656: 18656] Allocate a new trap: 0xc003c30ab0 39 D0323 21:16:55.266846 249972 usertrap_amd64.go:225] [ 18656: 18656] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.268308 249972 usertrap_amd64.go:212] [ 18656: 18656] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.268330 249972 usertrap_amd64.go:122] [ 18656: 18656] Allocate a new trap: 0xc003c30ab0 40 D0323 21:16:55.268350 249972 usertrap_amd64.go:225] [ 18656: 18656] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.268630 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.268817 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.271911 249972 usertrap_amd64.go:212] [ 18656: 18656] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.271927 249972 usertrap_amd64.go:122] [ 18656: 18656] Allocate a new trap: 0xc003c30ab0 41 D0323 21:16:55.271938 249972 usertrap_amd64.go:225] [ 18656: 18656] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.285917 249972 usertrap_amd64.go:212] [ 18656: 18656] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.285949 249972 usertrap_amd64.go:122] [ 18656: 18656] Allocate a new trap: 0xc003c30ab0 42 D0323 21:16:55.285964 249972 usertrap_amd64.go:225] [ 18656: 18656] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.286838 249972 task_exit.go:204] [ 18656: 18656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.286883 249972 task_exit.go:204] [ 18656: 18656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.286884 249972 task_signals.go:204] [ 18656: 18657] Signal 18656, PID: 18657, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.286919 249972 task_exit.go:204] [ 18656: 18657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.288693 249972 task_exit.go:204] [ 18656: 18657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.288740 249972 task_exit.go:204] [ 18656: 18657] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.288763 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.289515 249972 task_exit.go:204] [ 18656: 18656] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x1a6de4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x1000000) D0323 21:16:55.294371 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.295475 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.305623 249972 usertrap_amd64.go:212] [ 18658: 18658] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.305655 249972 usertrap_amd64.go:122] [ 18658: 18658] Allocate a new trap: 0xc003c30bd0 39 D0323 21:16:55.305743 249972 usertrap_amd64.go:225] [ 18658: 18658] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.309192 249972 usertrap_amd64.go:212] [ 18658: 18658] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.309249 249972 usertrap_amd64.go:122] [ 18658: 18658] Allocate a new trap: 0xc003c30bd0 40 D0323 21:16:55.309267 249972 usertrap_amd64.go:225] [ 18658: 18658] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.309837 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.310097 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.314716 249972 usertrap_amd64.go:212] [ 18658: 18658] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.314754 249972 usertrap_amd64.go:122] [ 18658: 18658] Allocate a new trap: 0xc003c30bd0 41 D0323 21:16:55.314769 249972 usertrap_amd64.go:225] [ 18658: 18658] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.334794 249972 usertrap_amd64.go:212] [ 18658: 18658] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.334839 249972 usertrap_amd64.go:122] [ 18658: 18658] Allocate a new trap: 0xc003c30bd0 42 D0323 21:16:55.334852 249972 usertrap_amd64.go:225] [ 18658: 18658] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.335365 249972 task_exit.go:204] [ 18658: 18658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.335570 249972 task_exit.go:204] [ 18658: 18658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.335919 249972 task_signals.go:204] [ 18658: 18659] Signal 18658, PID: 18659, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.335977 249972 task_exit.go:204] [ 18658: 18659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.337844 249972 task_exit.go:204] [ 18658: 18659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.337921 249972 task_exit.go:204] [ 18658: 18659] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.337971 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.339690 249972 task_exit.go:204] [ 18658: 18658] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000002880)={0x0, 0x0, 0x0}, 0x0) close(r0) D0323 21:16:55.351602 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.351744 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.361753 249972 usertrap_amd64.go:212] [ 18660: 18660] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.361792 249972 usertrap_amd64.go:122] [ 18660: 18660] Allocate a new trap: 0xc003c30cf0 39 D0323 21:16:55.361848 249972 usertrap_amd64.go:225] [ 18660: 18660] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.362563 249972 usertrap_amd64.go:212] [ 18660: 18660] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.362578 249972 usertrap_amd64.go:122] [ 18660: 18660] Allocate a new trap: 0xc003c30cf0 40 D0323 21:16:55.362588 249972 usertrap_amd64.go:225] [ 18660: 18660] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.363041 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.364771 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.367778 249972 usertrap_amd64.go:212] [ 18660: 18660] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.367809 249972 usertrap_amd64.go:122] [ 18660: 18660] Allocate a new trap: 0xc003c30cf0 41 D0323 21:16:55.367821 249972 usertrap_amd64.go:225] [ 18660: 18660] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.379041 249972 usertrap_amd64.go:212] [ 18660: 18660] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.379072 249972 usertrap_amd64.go:122] [ 18660: 18660] Allocate a new trap: 0xc003c30cf0 42 D0323 21:16:55.379086 249972 usertrap_amd64.go:225] [ 18660: 18660] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.379421 249972 task_exit.go:204] [ 18660: 18660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.379457 249972 task_exit.go:204] [ 18660: 18660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.379531 249972 task_signals.go:204] [ 18660: 18661] Signal 18660, PID: 18661, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.379566 249972 task_exit.go:204] [ 18660: 18661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.381141 249972 task_exit.go:204] [ 18660: 18661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.381179 249972 task_exit.go:204] [ 18660: 18661] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.381200 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.381919 249972 task_exit.go:204] [ 18660: 18660] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000002840)="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", 0x1000}, {&(0x7f0000000cc0)="a5d68a010a356ec88950de45a5b372e873a4bf61cdd52c3d0858d56dba276243e71437198942e45ade8eb158dd6c628f34133ac0eb3da509a249da33a22e2035df7dd74727c727dc4ecafd11a1718984497459d1097fdae4090dfbdd6b88163ae1b1e6bf65823fe7ea3350dae406c19d33bb0264820f79bd667be1eb9dd95b699912487640c0f581c9a53b0caeaa1d77a4276781c9544a1669be56788663f626bc57d38a3e9e7c1ab76499a5e143c666422560ac72557b336e80d1a60781b46013283fd27914e265716c67f2e0614fa1b4fa46cd2c", 0xd5}, {&(0x7f0000003840)="13dfd4fecfb3c3b8469b1620440f9a6ff034a22ce5b0784729a1ad5882aa4fa8c25dd677c8dfb86d1f43dc12c1d8047122fbb681d8c9259eab6b25996ba2aa0e67cec98c81830c951eab13ff327c68e5444986657557642ddff6257ddac147a5896e17570c7f60641ed237c19104347b0200d02185fd4ce46ecafbe7110d1aa45c0496a15f2233a520e7a9bdcb555a12df63193e0d1530ca2059134c71b7c3ca9b3d387d6c5bf252c9966f4e4fc3561048e8f3f84856af06fe9d6b20f0e89cb33408c12fd656387a112b040b2ccc40bc6f59fcb033ce180bbb0cb571b2080796a4c1695941b78373a9024e3f36971ceee45d3a6c51b4fe07b5e19cef4c0a09e8ec6b9a0747080de7690d3238bc5e386f8ceacb3f283ceb29162103ab3e3525a20a1d1da1033fded82acd34143ea9333db54155d5ba6f5000692384a4ce53951476daa6cb5c450f7840fdf7a0c8272f2564b81ccc905939c85a469154e1d5f16e4f2af8ed335bc7cba3287ad07979dc4e6b38cc7503aaadbfe1f6316f91b519c6efad734298e8d2f1baf8cc061d7fd6a4f53b4a3b54d10ba74adf487792f793626ab4d0d366705918df57739d8e5611a1594c9615e9cfeb276503565b8cf4ccf959231c9627688b8f83d5e593e818c5ea7e311962a160da82ef6bfc0e8b07b14ac96a3668384a08f9bda2cb1af3f2f0f1caf59c4e600255b62fac66d14eb055826ac549d746ac1e981afe58ddb0418cd38d277749b16580b20ed18efb8c0674a12ee36352a21e62a881eaac4149ba50dc06a3c3ffe4c9a620fd8a79a769b9dda1be87e75d566ed06428a8f5fdb9b0b80781ddcd872cabe6c37386cb23570326420539b6eb80541280647067d6647b44e1a3f256de9eaba2f06d5181fd7bc9229fac42af9455bb18cd03bd09f34895263cc2a52e4c0cbe877d5de09237a8c78e3d72bec8ccbf60662a525ddf7bf4fbdcd7acf11a462aca9d380f04d54d5fd6fc9b1070a4a2954a330afa9dc5e85fc170cefa2944a193734dfa597fbdf6a002bd21ef14d27985d405fb6a9929c763e51a90ade3a9437e69152953d0ee3dd1b7bc8b2f027209a953541e4d9ffbb594a5c19d6b5dbd912ef6b21d36861f49c54cf5c0db4e574d9feae092dd13dcbbc8cdc2e3fa2b939620bb2a1db4365c5e4a5150f59e70fd04b7683d50224ccab03e85a8c1fff8f3381255758646c4984207c298a4721be41590399350d1a5be87829072b32dd178de276b7e29a1681ba50b8a1d4effc193591d7c83ccbda265bfa7ae06d7e002186903a5bb82f18761d746dea99d1668708b911c37c77a54815a5ed8edf2f68e8a5926f929c170e4b2c050e5692c01a4de4da1f196416189d54ec73b2568d3dce6a74d420914002b0d569d79875f7b6e6cdd8a656508f32585da7576a7b25c3a50264a907b50dbb310bcbff64885457db70fb3d781f581c66e7d93e35916d8c5175bd8957aba22a4fa88aa609e1ac087f3e4fab98536f31b1907628a3774f2f5b1f8ad7a6ccffdda2267c379178c4e3193cce129b4e7bf7f5150513b431bea3bbf5d070d1e6dfd891d19619308128748d03ae431ed8f849ea24884949625cce965967a11eca22160a14b8ef632a19790231bfd8a1400134daa65605c6724f2c3c07823c49c81573749cf798450c45fc75f6fd8d40ae42be6851a88fee52a7ae3f09c3678e0ab4e4578d85d851bf32bac790aad38798d31d7bb173b94c60d1e58827df943e20392e2875118eadad2aa83703b6366100dd1091e56ebc4b54904aaba799b11e2c2e8855d2ea203b4197024061087b1bbceadba2e04b79ccdf4765fc3e2da511090f95614cd538f7e69867c68aca50c9f7458e78c5a491a2e99440529865847b4dfb6b011ba0a1fac2689c46e36cdb376d66826a1854ddd0ac470f8741235f65308b8aebc23070ec7721d5c4568b05b2c6c0cf83fb1be2231747045dafe30974e2315a4e767957a557174233704805ba3c9b6fe1b691951da2ccc2a2744d628a7c8376facf5b7b1510595efc778e06015bfce22e88855224650bd53ff71c44d5a50a8c3298ddd20a357465ff881d6cac8b1500dcdfb68d03948c5a48ba1762c611af64d7dc7a159e3c6ceb2b2a0f97d109fa6f8a22e001ec2bbd4c2ed74e11ee8019533e165349461ccb275354c95d3d95d1769e0bb0690f6aaa7fb7e2d09b0722cb35f7a7ee921c8cf9955ad64d37092711acfa5dc0979f851456d23b5efaf20a0a0653e2ad4d17aaa07b1e2b3ebbd4fa7053c8b8731b1d10961d9ebb8c74903518979e2617c95634f42270728e9b7ebd4cf272b500661249f3734b71dfe2a164f100781e9125d3cf2fb632ad4b8b6ce413f2fac49f2ccee4767251ce47fed2ba0a4d866dfe330de295e60f6086d8b0f674888c0fd31facc3b41544dcf85ffcd1249eb3b491c5e35ce998d8de4a3b2dddeef4b0cad2173466f41abf57392c26cea11f2585bf19a71d0d9e8c0892c8b2c7568a0b3de23087ed6898f2bd56596ff68d7efc71cb350e321823431c548eb0214e71a4d69641abfdcafa3116cc4767e27a390423e412183225721062b65833ea4036f76b613b02ee6271cd2a7a8b6742553a220bdc6e44ba2d5b6a8861cffbcf2a9bebb29ee8a1b7f54c22a7ec4ce7f382d626a2e8be5ca422e68ea736a8317b10bb87d9afd498ad9af0509e27af948e52be3f57fe084caab1c9fe15d299d9f6e369d62ca0440f681f825ea821c6c9585f250e9b6699ff3770cd55ce998f6c394c7465db3bcedf54e21d3732cffc094c71604abc70bf86ce99886bdfd2ab26cda0b889df96b4dd2a514748cbe7cf1d6f383d6b3a12776e5bb9378b076cf358c22e82d5c71adccc73efa012d96b1d35364e514956b8f750e14c551070c367a55cd8abf781d3efaa1a07482a6f612a23cabd811a72b8a0772063ba824e8368d27cf34708bab0e7a6a48c6e3c37d58c79e35f28136180ff777fc98dabccb25b9551b1ef6d120dc89a01f65c22b89a5050051258b24f0be5056cdf48a0ebf529e2b96a20d1e71be8190723eac95f324ddafcb11863767bbc519232e5d6add520d6b63b4d0c0fef9d8d610183f55d00c4a3d3fd475c7369b7feafd32dbd8d6406b149ac17ed71a673ba95451f88e24329c474d0da9a7d949203d377629fb5ce4eb9563ee4155b2293098a41e50a4bb2841017ce18c72af57a840ce093e4844744b3315222f20a56e16be4ce1b05d3063fad530fa4e0c3fa28bf5269ff10a9a22c13b9beca512c7655cb04f6812208d0b038d9fb9c608947b74c93b2e016749a8f0812bf6e4bec99ed177b3b1311cb6aba37739c18dcc7d46804a4431866def08853d06d5a55f59208ecd008bc4af226224212d0ae6128471bfaa225497877475a819e86c73f4880a7d2c067006f6d336d0c5ce27e44b5f9342a3e89444d8fb776281b23a883d4b18eaab403f01041393c732be05d58e87e3447aacc7c0c671d0c93de7fe8f9eb5c0b6fe3fbf5c599da4bfa441fd2cac6200327dd7bd3b6bf8a74a4d53068b44a423d3f9ed3d800b76562cd0c047e3c13536f4dbb443ffadce59c8af3819435776f04d2a38f3f3c165b10ad025650ce58a45618eca213d99f526278e9d775802c92d98da17f9121e0a5bb68851a0986d1ebfd24649d626104b4078dd982757c074e14d19ddafbac0e43a7ee30502aa86e640838c0b2b62a8ebeb37c560671dff79490ebf45455e1d1ec35ce9221b6b10efce2fa2935293d0e59db8f2acec8203507f135f1fa5fa8d9a16b154f1fa139e7f8f7c8368af95ee2d605da0fa3fb2905adafd8b6acb57c231c21597743471a04d428fe6441afccc29cce9e250b4d6f66a108364e06ef24a6c77d11b627222805c051684f2c9ce1cac3bd056464f1b9d6be491a5bb84522f8fd656165eda3df2ff693cf7284aa85e5e83c18f859107e2ba0d0d04f3f499d0ba18960784ade07af3f5db4b5c13cbca01d1c5a592a43d264dc5eeb6dfc2af62cc926e759b461e324be96acf5141f56f02f5f11a7793f54a964e587664997ae1398c41f4bf259906171d211b231bf8ff35306d9306342250f5fdfed06dbb88930be5c168c0ae735da1053f345f3650f93fdffff7d6c82d32764b7f7e0ba57221dce92a57ab73f5177ec5484e8d210c43368a98dc4bd6b8dd3c50072f359acb4b99d0d89761870c2fd6da2442bcf03847cbb6001b6d1a93cbc1db10907208ca1f2f4eee17ed37c75b6829bba6b877f566bf1590ba87d567ab8ada321df5f8bfa1527c019f7d2b9a7b30ad887939005d4ea6f2580951e717880ae9157d36294fbbf225b580945b1f8ec6ff88b9ccb4bb0ba084557d05144b963aaaf41a0bb96d686fc07507a3be50a0278042c6741b2ea80917dfc27b268ac3561fe3580dd14c6bc52fc5b1615b552a818a290dba6347483b013c7a0e037d10f765475a0f17dd5db03f0093f9121aac95578bc9f1ab557db933745ee018b13d8a39df572d72555a55f66851976e354bf24891c95531b6bd6154c6c37e02336af8cbde26fd47e1f17eb46d9ddef55d9f1dc0dc125b9842b736d19538fe7e878579e5996a871b0d570b27a02336d92b8299f07da3e206d9afbce7409b03703a17da7b89da4bb3058f7d716982b49b73e63a075e9bcc8ae7ec02b01dfbdf30bbf5552e38f24591c38e11bb8acc3dc28764cb9ad05a9833f67987db0806346b518a9f4a636828bffe2882729fb8f02894a89c512fe6e3d9d619a43f17bc56be5cbb85b825fe4bc74abe7e602d3e9cb8198a2d92160ba2b52fabee87be4b43683e10388f8f1c0153330160d108c027ee7d7006d2b0a46ddbe1de2e76e5933737396871840e6b8ba10d210f28a910a5fe4bfc27f509309823e1574f4610e0e58db9cc994bbff562cf13ef4aa34886e917094a881ae70242f5461621ec4873d20145539d", 0xdac}], 0x3}, 0x0) D0323 21:16:55.385510 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.385672 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.395304 249972 usertrap_amd64.go:212] [ 18662: 18662] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.395332 249972 usertrap_amd64.go:122] [ 18662: 18662] Allocate a new trap: 0xc0090270b0 39 D0323 21:16:55.395398 249972 usertrap_amd64.go:225] [ 18662: 18662] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.396321 249972 usertrap_amd64.go:212] [ 18662: 18662] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.396381 249972 usertrap_amd64.go:122] [ 18662: 18662] Allocate a new trap: 0xc0090270b0 40 D0323 21:16:55.396405 249972 usertrap_amd64.go:225] [ 18662: 18662] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.397194 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.397492 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.400604 249972 usertrap_amd64.go:212] [ 18662: 18662] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.400629 249972 usertrap_amd64.go:122] [ 18662: 18662] Allocate a new trap: 0xc0090270b0 41 D0323 21:16:55.400637 249972 usertrap_amd64.go:225] [ 18662: 18662] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.409377 249972 usertrap_amd64.go:212] [ 18662: 18662] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.409418 249972 usertrap_amd64.go:122] [ 18662: 18662] Allocate a new trap: 0xc0090270b0 42 D0323 21:16:55.409429 249972 usertrap_amd64.go:225] [ 18662: 18662] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.409844 249972 task_exit.go:204] [ 18662: 18662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.409892 249972 task_exit.go:204] [ 18662: 18662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.410030 249972 task_signals.go:204] [ 18662: 18663] Signal 18662, PID: 18663, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.410058 249972 task_exit.go:204] [ 18662: 18663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.411457 249972 task_exit.go:204] [ 18662: 18663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.411536 249972 task_exit.go:204] [ 18662: 18663] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.411589 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.412794 249972 task_exit.go:204] [ 18662: 18662] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.414134 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.414291 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:55 executing program 0: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) D0323 21:16:55.422934 249972 usertrap_amd64.go:212] [ 18664: 18664] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.422956 249972 usertrap_amd64.go:122] [ 18664: 18664] Allocate a new trap: 0xc00b2f1320 39 D0323 21:16:55.423087 249972 usertrap_amd64.go:225] [ 18664: 18664] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.424344 249972 usertrap_amd64.go:212] [ 18664: 18664] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.424367 249972 usertrap_amd64.go:122] [ 18664: 18664] Allocate a new trap: 0xc00b2f1320 40 D0323 21:16:55.424379 249972 usertrap_amd64.go:225] [ 18664: 18664] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.425288 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.425485 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.427884 249972 usertrap_amd64.go:212] [ 18664: 18664] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.427904 249972 usertrap_amd64.go:122] [ 18664: 18664] Allocate a new trap: 0xc00b2f1320 41 D0323 21:16:55.427912 249972 usertrap_amd64.go:225] [ 18664: 18664] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.437482 249972 usertrap_amd64.go:212] [ 18664: 18664] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.437501 249972 usertrap_amd64.go:122] [ 18664: 18664] Allocate a new trap: 0xc00b2f1320 42 D0323 21:16:55.437511 249972 usertrap_amd64.go:225] [ 18664: 18664] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.437929 249972 task_exit.go:204] [ 18664: 18664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.438014 249972 task_exit.go:204] [ 18664: 18664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.438103 249972 task_signals.go:204] [ 18664: 18665] Signal 18664, PID: 18665, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.438159 249972 task_exit.go:204] [ 18664: 18665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.439556 249972 task_exit.go:204] [ 18664: 18665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.439600 249972 task_exit.go:204] [ 18664: 18665] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.439617 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.441905 249972 task_exit.go:204] [ 18664: 18664] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: socket$inet6(0x18, 0x3, 0x6) D0323 21:16:55.444188 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.444364 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.454314 249972 usertrap_amd64.go:212] [ 18666: 18666] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.454344 249972 usertrap_amd64.go:122] [ 18666: 18666] Allocate a new trap: 0xc00b2f1410 39 D0323 21:16:55.454462 249972 usertrap_amd64.go:225] [ 18666: 18666] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.455300 249972 usertrap_amd64.go:212] [ 18666: 18666] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.455325 249972 usertrap_amd64.go:122] [ 18666: 18666] Allocate a new trap: 0xc00b2f1410 40 D0323 21:16:55.455333 249972 usertrap_amd64.go:225] [ 18666: 18666] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.455849 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.456033 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.459622 249972 usertrap_amd64.go:212] [ 18666: 18666] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.459677 249972 usertrap_amd64.go:122] [ 18666: 18666] Allocate a new trap: 0xc00b2f1410 41 D0323 21:16:55.459690 249972 usertrap_amd64.go:225] [ 18666: 18666] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.466298 249972 usertrap_amd64.go:212] [ 18666: 18666] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.466330 249972 usertrap_amd64.go:122] [ 18666: 18666] Allocate a new trap: 0xc00b2f1410 42 D0323 21:16:55.466343 249972 usertrap_amd64.go:225] [ 18666: 18666] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.466573 249972 task_exit.go:204] [ 18666: 18666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.466649 249972 task_exit.go:204] [ 18666: 18666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.466991 249972 task_signals.go:204] [ 18666: 18667] Signal 18666, PID: 18667, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.467062 249972 task_exit.go:204] [ 18666: 18667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.468558 249972 task_exit.go:204] [ 18666: 18667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.468583 249972 task_exit.go:204] [ 18666: 18667] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.468597 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.469933 249972 task_exit.go:204] [ 18666: 18666] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: open$dir(&(0x7f0000001a00)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x10882, 0x0) D0323 21:16:55.474468 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.474646 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.485945 249972 usertrap_amd64.go:212] [ 18668: 18668] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.485982 249972 usertrap_amd64.go:122] [ 18668: 18668] Allocate a new trap: 0xc009027650 39 D0323 21:16:55.486056 249972 usertrap_amd64.go:225] [ 18668: 18668] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.486456 249972 usertrap_amd64.go:212] [ 18668: 18668] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.486474 249972 usertrap_amd64.go:122] [ 18668: 18668] Allocate a new trap: 0xc009027650 40 D0323 21:16:55.486480 249972 usertrap_amd64.go:225] [ 18668: 18668] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.486768 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.486970 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.491673 249972 usertrap_amd64.go:212] [ 18668: 18668] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.491700 249972 usertrap_amd64.go:122] [ 18668: 18668] Allocate a new trap: 0xc009027650 41 D0323 21:16:55.491713 249972 usertrap_amd64.go:225] [ 18668: 18668] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.499443 249972 usertrap_amd64.go:212] [ 18668: 18668] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.499474 249972 usertrap_amd64.go:122] [ 18668: 18668] Allocate a new trap: 0xc009027650 42 D0323 21:16:55.499487 249972 usertrap_amd64.go:225] [ 18668: 18668] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.500160 249972 task_exit.go:204] [ 18668: 18668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.500211 249972 task_exit.go:204] [ 18668: 18668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.500296 249972 task_signals.go:204] [ 18668: 18669] Signal 18668, PID: 18669, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.500331 249972 task_exit.go:204] [ 18668: 18669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.502581 249972 task_exit.go:204] [ 18668: 18669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.502730 249972 task_exit.go:204] [ 18668: 18669] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.502796 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.502995 249972 task_exit.go:204] [ 18668: 18668] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.505428 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.505561 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:55 executing program 0: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) D0323 21:16:55.524573 249972 usertrap_amd64.go:212] [ 18670: 18670] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.524615 249972 usertrap_amd64.go:122] [ 18670: 18670] Allocate a new trap: 0xc00b2f16e0 39 D0323 21:16:55.524692 249972 usertrap_amd64.go:225] [ 18670: 18670] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.525399 249972 usertrap_amd64.go:212] [ 18670: 18670] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.525422 249972 usertrap_amd64.go:122] [ 18670: 18670] Allocate a new trap: 0xc00b2f16e0 40 D0323 21:16:55.525433 249972 usertrap_amd64.go:225] [ 18670: 18670] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.526169 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.526368 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.529297 249972 usertrap_amd64.go:212] [ 18670: 18670] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.529339 249972 usertrap_amd64.go:122] [ 18670: 18670] Allocate a new trap: 0xc00b2f16e0 41 D0323 21:16:55.529356 249972 usertrap_amd64.go:225] [ 18670: 18670] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.538626 249972 usertrap_amd64.go:212] [ 18670: 18670] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.538676 249972 usertrap_amd64.go:122] [ 18670: 18670] Allocate a new trap: 0xc00b2f16e0 42 D0323 21:16:55.538723 249972 usertrap_amd64.go:225] [ 18670: 18670] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.540314 249972 task_exit.go:204] [ 18670: 18670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.540358 249972 task_signals.go:204] [ 18670: 18671] Signal 18670, PID: 18671, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.540356 249972 task_exit.go:204] [ 18670: 18670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.540404 249972 task_exit.go:204] [ 18670: 18671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.541800 249972 task_exit.go:204] [ 18670: 18671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.541833 249972 task_exit.go:204] [ 18670: 18671] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.541851 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.542686 249972 task_exit.go:204] [ 18670: 18670] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) D0323 21:16:55.543826 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.543976 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.551765 249972 usertrap_amd64.go:212] [ 18672: 18672] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.551789 249972 usertrap_amd64.go:122] [ 18672: 18672] Allocate a new trap: 0xc008102b70 39 D0323 21:16:55.551883 249972 usertrap_amd64.go:225] [ 18672: 18672] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.552415 249972 usertrap_amd64.go:212] [ 18672: 18672] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.552437 249972 usertrap_amd64.go:122] [ 18672: 18672] Allocate a new trap: 0xc008102b70 40 D0323 21:16:55.552464 249972 usertrap_amd64.go:225] [ 18672: 18672] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.553043 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.553211 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.556836 249972 usertrap_amd64.go:212] [ 18672: 18672] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.556883 249972 usertrap_amd64.go:122] [ 18672: 18672] Allocate a new trap: 0xc008102b70 41 D0323 21:16:55.556914 249972 usertrap_amd64.go:225] [ 18672: 18672] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.565090 249972 usertrap_amd64.go:212] [ 18672: 18672] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.565125 249972 usertrap_amd64.go:122] [ 18672: 18672] Allocate a new trap: 0xc008102b70 42 D0323 21:16:55.565139 249972 usertrap_amd64.go:225] [ 18672: 18672] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.565500 249972 task_exit.go:204] [ 18672: 18672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.565550 249972 task_exit.go:204] [ 18672: 18672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.565611 249972 task_signals.go:204] [ 18672: 18673] Signal 18672, PID: 18673, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.565647 249972 task_exit.go:204] [ 18672: 18673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.566978 249972 task_exit.go:204] [ 18672: 18673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.567011 249972 task_exit.go:204] [ 18672: 18673] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.567033 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.567990 249972 task_exit.go:204] [ 18672: 18672] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.570322 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.570485 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x560d, &(0x7f0000000000)) D0323 21:16:55.581552 249972 usertrap_amd64.go:212] [ 18674: 18674] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.581588 249972 usertrap_amd64.go:122] [ 18674: 18674] Allocate a new trap: 0xc0087be7b0 39 D0323 21:16:55.581733 249972 usertrap_amd64.go:225] [ 18674: 18674] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.582264 249972 usertrap_amd64.go:212] [ 18674: 18674] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.582361 249972 usertrap_amd64.go:122] [ 18674: 18674] Allocate a new trap: 0xc0087be7b0 40 D0323 21:16:55.582391 249972 usertrap_amd64.go:225] [ 18674: 18674] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.582937 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.583149 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.586299 249972 usertrap_amd64.go:212] [ 18674: 18674] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.586386 249972 usertrap_amd64.go:122] [ 18674: 18674] Allocate a new trap: 0xc0087be7b0 41 D0323 21:16:55.586408 249972 usertrap_amd64.go:225] [ 18674: 18674] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.593908 249972 usertrap_amd64.go:212] [ 18674: 18675] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:55.593941 249972 usertrap_amd64.go:122] [ 18674: 18675] Allocate a new trap: 0xc0087be7b0 42 D0323 21:16:55.593956 249972 usertrap_amd64.go:225] [ 18674: 18675] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.594460 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.594642 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.597072 249972 usertrap_amd64.go:212] [ 18674: 18674] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.597117 249972 usertrap_amd64.go:122] [ 18674: 18674] Allocate a new trap: 0xc0087be7b0 43 D0323 21:16:55.597133 249972 usertrap_amd64.go:225] [ 18674: 18674] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:55.597573 249972 task_exit.go:204] [ 18674: 18674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.597725 249972 task_exit.go:204] [ 18674: 18674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.597798 249972 task_signals.go:204] [ 18674: 18675] Signal 18674, PID: 18675, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.597827 249972 task_exit.go:204] [ 18674: 18675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.599177 249972 task_exit.go:204] [ 18674: 18675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.599199 249972 task_exit.go:204] [ 18674: 18675] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.599220 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.600853 249972 task_exit.go:204] [ 18674: 18674] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000140), 0x4) D0323 21:16:55.601979 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.602576 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.611293 249972 usertrap_amd64.go:212] [ 18676: 18676] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.611326 249972 usertrap_amd64.go:122] [ 18676: 18676] Allocate a new trap: 0xc0087be870 39 D0323 21:16:55.611412 249972 usertrap_amd64.go:225] [ 18676: 18676] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.611890 249972 usertrap_amd64.go:212] [ 18676: 18676] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.611914 249972 usertrap_amd64.go:122] [ 18676: 18676] Allocate a new trap: 0xc0087be870 40 D0323 21:16:55.611926 249972 usertrap_amd64.go:225] [ 18676: 18676] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.612347 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.612514 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.614733 249972 usertrap_amd64.go:212] [ 18676: 18676] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.614755 249972 usertrap_amd64.go:122] [ 18676: 18676] Allocate a new trap: 0xc0087be870 41 D0323 21:16:55.614762 249972 usertrap_amd64.go:225] [ 18676: 18676] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.628868 249972 usertrap_amd64.go:212] [ 18676: 18676] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.628901 249972 usertrap_amd64.go:122] [ 18676: 18676] Allocate a new trap: 0xc0087be870 42 D0323 21:16:55.628914 249972 usertrap_amd64.go:225] [ 18676: 18676] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.629312 249972 task_exit.go:204] [ 18676: 18676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.629347 249972 task_exit.go:204] [ 18676: 18676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.629448 249972 task_signals.go:204] [ 18676: 18677] Signal 18676, PID: 18677, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.629509 249972 task_exit.go:204] [ 18676: 18677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.631348 249972 task_exit.go:204] [ 18676: 18677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.631386 249972 task_exit.go:204] [ 18676: 18677] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.631402 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.632763 249972 task_exit.go:204] [ 18676: 18676] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: setresgid(0xffffffffffffffff, 0xee01, 0xee00) D0323 21:16:55.643364 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.643552 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.651791 249972 usertrap_amd64.go:212] [ 18678: 18678] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.651816 249972 usertrap_amd64.go:122] [ 18678: 18678] Allocate a new trap: 0xc00b2f1b90 39 D0323 21:16:55.651887 249972 usertrap_amd64.go:225] [ 18678: 18678] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.652268 249972 usertrap_amd64.go:212] [ 18678: 18678] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.652288 249972 usertrap_amd64.go:122] [ 18678: 18678] Allocate a new trap: 0xc00b2f1b90 40 D0323 21:16:55.652298 249972 usertrap_amd64.go:225] [ 18678: 18678] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.652657 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.652834 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.655667 249972 usertrap_amd64.go:212] [ 18678: 18678] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.655696 249972 usertrap_amd64.go:122] [ 18678: 18678] Allocate a new trap: 0xc00b2f1b90 41 D0323 21:16:55.655708 249972 usertrap_amd64.go:225] [ 18678: 18678] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.661288 249972 usertrap_amd64.go:212] [ 18678: 18678] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.661323 249972 usertrap_amd64.go:122] [ 18678: 18678] Allocate a new trap: 0xc00b2f1b90 42 D0323 21:16:55.661337 249972 usertrap_amd64.go:225] [ 18678: 18678] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.661685 249972 task_exit.go:204] [ 18678: 18678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.661711 249972 task_exit.go:204] [ 18678: 18678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.661794 249972 task_signals.go:204] [ 18678: 18679] Signal 18678, PID: 18679, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.661819 249972 task_exit.go:204] [ 18678: 18679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.663723 249972 task_exit.go:204] [ 18678: 18679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.663741 249972 task_exit.go:204] [ 18678: 18679] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.663765 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.663819 249972 task_exit.go:204] [ 18678: 18678] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)) D0323 21:16:55.670806 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.670977 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.679283 249972 usertrap_amd64.go:212] [ 18680: 18680] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.679313 249972 usertrap_amd64.go:122] [ 18680: 18680] Allocate a new trap: 0xc0087be930 39 D0323 21:16:55.679404 249972 usertrap_amd64.go:225] [ 18680: 18680] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.679946 249972 usertrap_amd64.go:212] [ 18680: 18680] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.680028 249972 usertrap_amd64.go:122] [ 18680: 18680] Allocate a new trap: 0xc0087be930 40 D0323 21:16:55.680051 249972 usertrap_amd64.go:225] [ 18680: 18680] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.680734 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.681078 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.683691 249972 usertrap_amd64.go:212] [ 18680: 18680] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.683712 249972 usertrap_amd64.go:122] [ 18680: 18680] Allocate a new trap: 0xc0087be930 41 D0323 21:16:55.683721 249972 usertrap_amd64.go:225] [ 18680: 18680] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.694488 249972 usertrap_amd64.go:212] [ 18680: 18680] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.694514 249972 usertrap_amd64.go:122] [ 18680: 18680] Allocate a new trap: 0xc0087be930 42 D0323 21:16:55.694525 249972 usertrap_amd64.go:225] [ 18680: 18680] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.694842 249972 task_exit.go:204] [ 18680: 18680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.694875 249972 task_exit.go:204] [ 18680: 18680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.696829 249972 task_signals.go:204] [ 18680: 18681] Signal 18680, PID: 18681, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.696852 249972 task_exit.go:204] [ 18680: 18681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.698410 249972 task_exit.go:204] [ 18680: 18681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.698442 249972 task_exit.go:204] [ 18680: 18681] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.698460 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.702405 249972 task_exit.go:204] [ 18680: 18680] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: syz_emit_ethernet(0x5e, &(0x7f0000000000), 0x0) D0323 21:16:55.707211 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.707382 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.717855 249972 usertrap_amd64.go:212] [ 18682: 18682] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.717889 249972 usertrap_amd64.go:122] [ 18682: 18682] Allocate a new trap: 0xc00a4246c0 39 D0323 21:16:55.717981 249972 usertrap_amd64.go:225] [ 18682: 18682] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.718458 249972 usertrap_amd64.go:212] [ 18682: 18682] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.718471 249972 usertrap_amd64.go:122] [ 18682: 18682] Allocate a new trap: 0xc00a4246c0 40 D0323 21:16:55.718480 249972 usertrap_amd64.go:225] [ 18682: 18682] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.719587 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.719754 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.722404 249972 usertrap_amd64.go:212] [ 18682: 18682] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.722430 249972 usertrap_amd64.go:122] [ 18682: 18682] Allocate a new trap: 0xc00a4246c0 41 D0323 21:16:55.722452 249972 usertrap_amd64.go:225] [ 18682: 18682] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.730705 249972 usertrap_amd64.go:212] [ 18682: 18683] Found the pattern at ip 560eeddcbe78:sysno 1 D0323 21:16:55.730738 249972 usertrap_amd64.go:122] [ 18682: 18683] Allocate a new trap: 0xc00a4246c0 42 D0323 21:16:55.730753 249972 usertrap_amd64.go:225] [ 18682: 18683] Apply the binary patch addr 560eeddcbe78 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.732617 249972 usertrap_amd64.go:212] [ 18682: 18682] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.732635 249972 usertrap_amd64.go:122] [ 18682: 18682] Allocate a new trap: 0xc00a4246c0 43 D0323 21:16:55.732650 249972 usertrap_amd64.go:225] [ 18682: 18682] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:55.732864 249972 task_exit.go:204] [ 18682: 18682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.732900 249972 task_exit.go:204] [ 18682: 18682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.734800 249972 task_signals.go:204] [ 18682: 18683] Signal 18682, PID: 18683, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.734836 249972 task_exit.go:204] [ 18682: 18683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.735044 249972 task_exit.go:204] [ 18682: 18683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.735078 249972 task_exit.go:204] [ 18682: 18683] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.735089 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.738191 249972 task_exit.go:204] [ 18682: 18682] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.738944 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.739088 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:55 executing program 0: socket$inet6_tcp(0x10, 0x2, 0x3) D0323 21:16:55.756042 249972 usertrap_amd64.go:212] [ 18684: 18684] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.756079 249972 usertrap_amd64.go:122] [ 18684: 18684] Allocate a new trap: 0xc0087beb10 39 D0323 21:16:55.756163 249972 usertrap_amd64.go:225] [ 18684: 18684] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.757202 249972 usertrap_amd64.go:212] [ 18684: 18684] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.757227 249972 usertrap_amd64.go:122] [ 18684: 18684] Allocate a new trap: 0xc0087beb10 40 D0323 21:16:55.757237 249972 usertrap_amd64.go:225] [ 18684: 18684] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.761279 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.761558 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.763931 249972 usertrap_amd64.go:212] [ 18684: 18684] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.763959 249972 usertrap_amd64.go:122] [ 18684: 18684] Allocate a new trap: 0xc0087beb10 41 D0323 21:16:55.763970 249972 usertrap_amd64.go:225] [ 18684: 18684] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.770415 249972 usertrap_amd64.go:212] [ 18684: 18684] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.770442 249972 usertrap_amd64.go:122] [ 18684: 18684] Allocate a new trap: 0xc0087beb10 42 D0323 21:16:55.770451 249972 usertrap_amd64.go:225] [ 18684: 18684] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.770824 249972 task_exit.go:204] [ 18684: 18684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.770857 249972 task_exit.go:204] [ 18684: 18684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.771294 249972 task_signals.go:204] [ 18684: 18685] Signal 18684, PID: 18685, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.771324 249972 task_exit.go:204] [ 18684: 18685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.772241 249972 task_exit.go:204] [ 18684: 18685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.772266 249972 task_exit.go:204] [ 18684: 18685] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.772279 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.772891 249972 task_exit.go:204] [ 18684: 18684] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.777981 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.778168 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:55 executing program 0: add_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) D0323 21:16:55.791826 249972 usertrap_amd64.go:212] [ 18686: 18686] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.791862 249972 usertrap_amd64.go:122] [ 18686: 18686] Allocate a new trap: 0xc003c314a0 39 D0323 21:16:55.791940 249972 usertrap_amd64.go:225] [ 18686: 18686] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.792602 249972 usertrap_amd64.go:212] [ 18686: 18686] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.792653 249972 usertrap_amd64.go:122] [ 18686: 18686] Allocate a new trap: 0xc003c314a0 40 D0323 21:16:55.792670 249972 usertrap_amd64.go:225] [ 18686: 18686] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.793358 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.793559 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.795872 249972 usertrap_amd64.go:212] [ 18686: 18686] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.795901 249972 usertrap_amd64.go:122] [ 18686: 18686] Allocate a new trap: 0xc003c314a0 41 D0323 21:16:55.795914 249972 usertrap_amd64.go:225] [ 18686: 18686] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.799918 249972 usertrap_amd64.go:212] [ 18686: 18686] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.799956 249972 usertrap_amd64.go:122] [ 18686: 18686] Allocate a new trap: 0xc003c314a0 42 D0323 21:16:55.799972 249972 usertrap_amd64.go:225] [ 18686: 18686] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.800929 249972 task_exit.go:204] [ 18686: 18686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.801009 249972 task_exit.go:204] [ 18686: 18686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.801010 249972 task_signals.go:204] [ 18686: 18687] Signal 18686, PID: 18687, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.801039 249972 task_exit.go:204] [ 18686: 18687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.802768 249972 task_exit.go:204] [ 18686: 18687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.802796 249972 task_exit.go:204] [ 18686: 18687] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.802821 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.803855 249972 task_exit.go:204] [ 18686: 18686] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x560d, &(0x7f0000000040)) D0323 21:16:55.810275 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.810435 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.818434 249972 usertrap_amd64.go:212] [ 18688: 18688] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.818463 249972 usertrap_amd64.go:122] [ 18688: 18688] Allocate a new trap: 0xc0087bebd0 39 D0323 21:16:55.818557 249972 usertrap_amd64.go:225] [ 18688: 18688] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.819175 249972 usertrap_amd64.go:212] [ 18688: 18688] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.819240 249972 usertrap_amd64.go:122] [ 18688: 18688] Allocate a new trap: 0xc0087bebd0 40 D0323 21:16:55.819288 249972 usertrap_amd64.go:225] [ 18688: 18688] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.819810 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.819994 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.824158 249972 usertrap_amd64.go:212] [ 18688: 18688] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.824191 249972 usertrap_amd64.go:122] [ 18688: 18688] Allocate a new trap: 0xc0087bebd0 41 D0323 21:16:55.824203 249972 usertrap_amd64.go:225] [ 18688: 18688] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.833234 249972 usertrap_amd64.go:212] [ 18688: 18689] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:55.833264 249972 usertrap_amd64.go:122] [ 18688: 18689] Allocate a new trap: 0xc0087bebd0 42 D0323 21:16:55.833276 249972 usertrap_amd64.go:225] [ 18688: 18689] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.833843 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.834122 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.836139 249972 usertrap_amd64.go:212] [ 18688: 18688] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.836205 249972 usertrap_amd64.go:122] [ 18688: 18688] Allocate a new trap: 0xc0087bebd0 43 D0323 21:16:55.836231 249972 usertrap_amd64.go:225] [ 18688: 18688] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:55.836497 249972 task_exit.go:204] [ 18688: 18688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.836534 249972 task_exit.go:204] [ 18688: 18688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.836660 249972 task_signals.go:204] [ 18688: 18689] Signal 18688, PID: 18689, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.836705 249972 task_exit.go:204] [ 18688: 18689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.838967 249972 task_exit.go:204] [ 18688: 18689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.839042 249972 task_exit.go:204] [ 18688: 18689] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.839092 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.839898 249972 task_exit.go:204] [ 18688: 18688] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=', @ANYBLOB=',r'], 0x0, 0x0, 0x0) D0323 21:16:55.842401 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.842519 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.849709 249972 usertrap_amd64.go:212] [ 18690: 18690] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.849746 249972 usertrap_amd64.go:122] [ 18690: 18690] Allocate a new trap: 0xc003c31620 39 D0323 21:16:55.849841 249972 usertrap_amd64.go:225] [ 18690: 18690] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.851662 249972 usertrap_amd64.go:212] [ 18690: 18690] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.851697 249972 usertrap_amd64.go:122] [ 18690: 18690] Allocate a new trap: 0xc003c31620 40 D0323 21:16:55.851711 249972 usertrap_amd64.go:225] [ 18690: 18690] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.853251 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.853397 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.856338 249972 usertrap_amd64.go:212] [ 18690: 18690] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.856363 249972 usertrap_amd64.go:122] [ 18690: 18690] Allocate a new trap: 0xc003c31620 41 D0323 21:16:55.856373 249972 usertrap_amd64.go:225] [ 18690: 18690] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.865866 249972 usertrap_amd64.go:212] [ 18690: 18690] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.865902 249972 usertrap_amd64.go:122] [ 18690: 18690] Allocate a new trap: 0xc003c31620 42 D0323 21:16:55.865922 249972 usertrap_amd64.go:225] [ 18690: 18690] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.866401 249972 task_exit.go:204] [ 18690: 18690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.866436 249972 task_exit.go:204] [ 18690: 18690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.866453 249972 task_signals.go:204] [ 18690: 18691] Signal 18690, PID: 18691, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.866485 249972 task_exit.go:204] [ 18690: 18691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.868593 249972 task_exit.go:204] [ 18690: 18691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.868631 249972 task_exit.go:204] [ 18690: 18691] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.868642 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.869590 249972 task_exit.go:204] [ 18690: 18690] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.870368 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} 21:16:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}}) D0323 21:16:55.870554 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.884973 249972 usertrap_amd64.go:212] [ 18692: 18692] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.885014 249972 usertrap_amd64.go:122] [ 18692: 18692] Allocate a new trap: 0xc007c40120 39 D0323 21:16:55.885108 249972 usertrap_amd64.go:225] [ 18692: 18692] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.885764 249972 usertrap_amd64.go:212] [ 18692: 18692] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.885783 249972 usertrap_amd64.go:122] [ 18692: 18692] Allocate a new trap: 0xc007c40120 40 D0323 21:16:55.885794 249972 usertrap_amd64.go:225] [ 18692: 18692] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.886740 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.886987 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.891496 249972 usertrap_amd64.go:212] [ 18692: 18692] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.891527 249972 usertrap_amd64.go:122] [ 18692: 18692] Allocate a new trap: 0xc007c40120 41 D0323 21:16:55.891541 249972 usertrap_amd64.go:225] [ 18692: 18692] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.898981 249972 usertrap_amd64.go:212] [ 18692: 18692] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.899018 249972 usertrap_amd64.go:122] [ 18692: 18692] Allocate a new trap: 0xc007c40120 42 D0323 21:16:55.899033 249972 usertrap_amd64.go:225] [ 18692: 18692] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.899368 249972 task_exit.go:204] [ 18692: 18692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.899409 249972 task_exit.go:204] [ 18692: 18692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.899480 249972 task_signals.go:204] [ 18692: 18693] Signal 18692, PID: 18693, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.899517 249972 task_exit.go:204] [ 18692: 18693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.902037 249972 task_exit.go:204] [ 18692: 18693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.902081 249972 task_exit.go:204] [ 18692: 18693] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.902093 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.902554 249972 task_exit.go:204] [ 18692: 18692] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) r0 = eventfd(0xe2000) read$eventfd(r0, &(0x7f00000001c0), 0x8) D0323 21:16:55.905455 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.905695 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.913442 249972 usertrap_amd64.go:212] [ 18694: 18694] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.913485 249972 usertrap_amd64.go:122] [ 18694: 18694] Allocate a new trap: 0xc007c401e0 39 D0323 21:16:55.913606 249972 usertrap_amd64.go:225] [ 18694: 18694] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.914057 249972 usertrap_amd64.go:212] [ 18694: 18694] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.914083 249972 usertrap_amd64.go:122] [ 18694: 18694] Allocate a new trap: 0xc007c401e0 40 D0323 21:16:55.914095 249972 usertrap_amd64.go:225] [ 18694: 18694] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.914445 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.914608 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.917228 249972 usertrap_amd64.go:212] [ 18694: 18694] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.917250 249972 usertrap_amd64.go:122] [ 18694: 18694] Allocate a new trap: 0xc007c401e0 41 D0323 21:16:55.917260 249972 usertrap_amd64.go:225] [ 18694: 18694] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.929213 249972 usertrap_amd64.go:212] [ 18694: 18694] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.929242 249972 usertrap_amd64.go:122] [ 18694: 18694] Allocate a new trap: 0xc007c401e0 42 D0323 21:16:55.929253 249972 usertrap_amd64.go:225] [ 18694: 18694] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.930390 249972 task_exit.go:204] [ 18694: 18694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.930435 249972 task_exit.go:204] [ 18694: 18694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.930495 249972 task_signals.go:204] [ 18694: 18695] Signal 18694, PID: 18695, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.930536 249972 task_exit.go:204] [ 18694: 18695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.933219 249972 task_exit.go:204] [ 18694: 18695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.933258 249972 task_exit.go:204] [ 18694: 18695] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.933280 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.934526 249972 task_exit.go:204] [ 18694: 18694] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8917, &(0x7f0000000000)={'batadv_slave_0\x00'}) D0323 21:16:55.935573 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.935771 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.947259 249972 usertrap_amd64.go:212] [ 18696: 18696] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.947293 249972 usertrap_amd64.go:122] [ 18696: 18696] Allocate a new trap: 0xc008102e70 39 D0323 21:16:55.947441 249972 usertrap_amd64.go:225] [ 18696: 18696] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.948767 249972 usertrap_amd64.go:212] [ 18696: 18696] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.948794 249972 usertrap_amd64.go:122] [ 18696: 18696] Allocate a new trap: 0xc008102e70 40 D0323 21:16:55.948813 249972 usertrap_amd64.go:225] [ 18696: 18696] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.949510 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.949698 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.954026 249972 usertrap_amd64.go:212] [ 18696: 18696] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.954052 249972 usertrap_amd64.go:122] [ 18696: 18696] Allocate a new trap: 0xc008102e70 41 D0323 21:16:55.954060 249972 usertrap_amd64.go:225] [ 18696: 18696] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.962912 249972 usertrap_amd64.go:212] [ 18696: 18696] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.962943 249972 usertrap_amd64.go:122] [ 18696: 18696] Allocate a new trap: 0xc008102e70 42 D0323 21:16:55.962956 249972 usertrap_amd64.go:225] [ 18696: 18696] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.963447 249972 task_exit.go:204] [ 18696: 18696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.963483 249972 task_exit.go:204] [ 18696: 18696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.963583 249972 task_signals.go:204] [ 18696: 18697] Signal 18696, PID: 18697, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.963633 249972 task_exit.go:204] [ 18696: 18697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.965342 249972 task_exit.go:204] [ 18696: 18697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.965377 249972 task_exit.go:204] [ 18696: 18697] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.965390 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.965465 249972 task_exit.go:204] [ 18696: 18696] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) syz_clone(0x40100080, 0x0, 0x0, 0x0, 0x0, 0x0) D0323 21:16:55.967545 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:55.967810 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.978439 249972 usertrap_amd64.go:212] [ 18698: 18698] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:55.978477 249972 usertrap_amd64.go:122] [ 18698: 18698] Allocate a new trap: 0xc008102f60 39 D0323 21:16:55.978596 249972 usertrap_amd64.go:225] [ 18698: 18698] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:55.979721 249972 usertrap_amd64.go:212] [ 18698: 18698] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:55.979743 249972 usertrap_amd64.go:122] [ 18698: 18698] Allocate a new trap: 0xc008102f60 40 D0323 21:16:55.979751 249972 usertrap_amd64.go:225] [ 18698: 18698] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:55.980517 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:55.980726 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:55.984534 249972 usertrap_amd64.go:212] [ 18698: 18698] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:55.984565 249972 usertrap_amd64.go:122] [ 18698: 18698] Allocate a new trap: 0xc008102f60 41 D0323 21:16:55.984577 249972 usertrap_amd64.go:225] [ 18698: 18698] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:55.995305 249972 usertrap_amd64.go:212] [ 18698: 18698] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:55.995350 249972 usertrap_amd64.go:122] [ 18698: 18698] Allocate a new trap: 0xc008102f60 42 D0323 21:16:55.995370 249972 usertrap_amd64.go:225] [ 18698: 18698] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:55.995962 249972 task_exit.go:204] [ 18698: 18698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.996005 249972 task_exit.go:204] [ 18698: 18698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.996048 249972 task_signals.go:204] [ 18698: 18699] Signal 18698, PID: 18699, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:55.996082 249972 task_exit.go:204] [ 18698: 18699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:55.997706 249972 task_exit.go:204] [ 18698: 18699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:55.997744 249972 task_exit.go:204] [ 18698: 18699] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:55.997765 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:55.997856 249972 task_exit.go:204] [ 18698: 18698] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'gretap0\x00', 0x0}) D0323 21:16:56.000731 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.001113 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.009620 249972 usertrap_amd64.go:212] [ 18700: 18700] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.009711 249972 usertrap_amd64.go:122] [ 18700: 18700] Allocate a new trap: 0xc0087becf0 39 D0323 21:16:56.009814 249972 usertrap_amd64.go:225] [ 18700: 18700] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.010436 249972 usertrap_amd64.go:212] [ 18700: 18700] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.010478 249972 usertrap_amd64.go:122] [ 18700: 18700] Allocate a new trap: 0xc0087becf0 40 D0323 21:16:56.010495 249972 usertrap_amd64.go:225] [ 18700: 18700] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.011301 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.011573 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.014828 249972 usertrap_amd64.go:212] [ 18700: 18700] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.014857 249972 usertrap_amd64.go:122] [ 18700: 18700] Allocate a new trap: 0xc0087becf0 41 D0323 21:16:56.014869 249972 usertrap_amd64.go:225] [ 18700: 18700] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.021178 249972 usertrap_amd64.go:212] [ 18700: 18700] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.021209 249972 usertrap_amd64.go:122] [ 18700: 18700] Allocate a new trap: 0xc0087becf0 42 D0323 21:16:56.021222 249972 usertrap_amd64.go:225] [ 18700: 18700] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.021669 249972 task_exit.go:204] [ 18700: 18700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.021711 249972 task_exit.go:204] [ 18700: 18700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.022562 249972 task_signals.go:204] [ 18700: 18701] Signal 18700, PID: 18701, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.022597 249972 task_exit.go:204] [ 18700: 18701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.025075 249972 task_exit.go:204] [ 18700: 18701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.025111 249972 task_exit.go:204] [ 18700: 18701] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.025122 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.025176 249972 task_exit.go:204] [ 18700: 18700] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: socket$inet6_tcp(0x11, 0x2, 0x0) D0323 21:16:56.028152 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.028326 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.037678 249972 usertrap_amd64.go:212] [ 18702: 18702] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.037714 249972 usertrap_amd64.go:122] [ 18702: 18702] Allocate a new trap: 0xc00b2f1d10 39 D0323 21:16:56.037790 249972 usertrap_amd64.go:225] [ 18702: 18702] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.038280 249972 usertrap_amd64.go:212] [ 18702: 18702] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.038303 249972 usertrap_amd64.go:122] [ 18702: 18702] Allocate a new trap: 0xc00b2f1d10 40 D0323 21:16:56.038312 249972 usertrap_amd64.go:225] [ 18702: 18702] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.038770 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.038927 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.046082 249972 usertrap_amd64.go:212] [ 18702: 18702] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.046118 249972 usertrap_amd64.go:122] [ 18702: 18702] Allocate a new trap: 0xc00b2f1d10 41 D0323 21:16:56.046131 249972 usertrap_amd64.go:225] [ 18702: 18702] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.053334 249972 usertrap_amd64.go:212] [ 18702: 18702] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.053372 249972 usertrap_amd64.go:122] [ 18702: 18702] Allocate a new trap: 0xc00b2f1d10 42 D0323 21:16:56.053388 249972 usertrap_amd64.go:225] [ 18702: 18702] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.053765 249972 task_exit.go:204] [ 18702: 18702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.053799 249972 task_exit.go:204] [ 18702: 18702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.053891 249972 task_signals.go:204] [ 18702: 18703] Signal 18702, PID: 18703, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.053941 249972 task_exit.go:204] [ 18702: 18703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.055663 249972 task_exit.go:204] [ 18702: 18703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.055711 249972 task_exit.go:204] [ 18702: 18703] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.055731 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.056981 249972 task_exit.go:204] [ 18702: 18702] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: socket$inet6_tcp(0x10, 0x2, 0xa) D0323 21:16:56.058487 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.058650 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.068856 249972 usertrap_amd64.go:212] [ 18704: 18704] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.068890 249972 usertrap_amd64.go:122] [ 18704: 18704] Allocate a new trap: 0xc00a424de0 39 D0323 21:16:56.069071 249972 usertrap_amd64.go:225] [ 18704: 18704] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.069883 249972 usertrap_amd64.go:212] [ 18704: 18704] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.069913 249972 usertrap_amd64.go:122] [ 18704: 18704] Allocate a new trap: 0xc00a424de0 40 D0323 21:16:56.069928 249972 usertrap_amd64.go:225] [ 18704: 18704] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.070564 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.070760 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.076289 249972 usertrap_amd64.go:212] [ 18704: 18704] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.076324 249972 usertrap_amd64.go:122] [ 18704: 18704] Allocate a new trap: 0xc00a424de0 41 D0323 21:16:56.076342 249972 usertrap_amd64.go:225] [ 18704: 18704] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.083960 249972 usertrap_amd64.go:212] [ 18704: 18704] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.084002 249972 usertrap_amd64.go:122] [ 18704: 18704] Allocate a new trap: 0xc00a424de0 42 D0323 21:16:56.084019 249972 usertrap_amd64.go:225] [ 18704: 18704] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.084489 249972 task_exit.go:204] [ 18704: 18704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.084539 249972 task_exit.go:204] [ 18704: 18704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.084612 249972 task_signals.go:204] [ 18704: 18705] Signal 18704, PID: 18705, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.084652 249972 task_exit.go:204] [ 18704: 18705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.086044 249972 task_exit.go:204] [ 18704: 18705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.086069 249972 task_exit.go:204] [ 18704: 18705] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.086080 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.087192 249972 task_exit.go:204] [ 18704: 18704] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b62, &(0x7f0000000040)) D0323 21:16:56.088494 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.088623 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.095949 249972 usertrap_amd64.go:212] [ 18706: 18706] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.095984 249972 usertrap_amd64.go:122] [ 18706: 18706] Allocate a new trap: 0xc00a424e40 39 D0323 21:16:56.096077 249972 usertrap_amd64.go:225] [ 18706: 18706] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.096752 249972 usertrap_amd64.go:212] [ 18706: 18706] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.096778 249972 usertrap_amd64.go:122] [ 18706: 18706] Allocate a new trap: 0xc00a424e40 40 D0323 21:16:56.096789 249972 usertrap_amd64.go:225] [ 18706: 18706] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.097184 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.097342 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.101924 249972 usertrap_amd64.go:212] [ 18706: 18706] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.101955 249972 usertrap_amd64.go:122] [ 18706: 18706] Allocate a new trap: 0xc00a424e40 41 D0323 21:16:56.101968 249972 usertrap_amd64.go:225] [ 18706: 18706] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.110738 249972 usertrap_amd64.go:212] [ 18706: 18707] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.110772 249972 usertrap_amd64.go:122] [ 18706: 18707] Allocate a new trap: 0xc00a424e40 42 D0323 21:16:56.110786 249972 usertrap_amd64.go:225] [ 18706: 18707] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.112104 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.112301 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.115080 249972 usertrap_amd64.go:212] [ 18706: 18706] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.115134 249972 usertrap_amd64.go:122] [ 18706: 18706] Allocate a new trap: 0xc00a424e40 43 D0323 21:16:56.115154 249972 usertrap_amd64.go:225] [ 18706: 18706] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.115737 249972 task_exit.go:204] [ 18706: 18706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.115789 249972 task_exit.go:204] [ 18706: 18706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.115925 249972 task_signals.go:204] [ 18706: 18707] Signal 18706, PID: 18707, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.115962 249972 task_exit.go:204] [ 18706: 18707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.118304 249972 task_exit.go:204] [ 18706: 18707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.118345 249972 task_exit.go:204] [ 18706: 18707] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.118365 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.119136 249972 task_exit.go:204] [ 18706: 18706] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000023c0), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f0000002400)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) D0323 21:16:56.121959 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.122112 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.131450 249972 usertrap_amd64.go:212] [ 18708: 18708] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.131495 249972 usertrap_amd64.go:122] [ 18708: 18708] Allocate a new trap: 0xc007c40570 39 D0323 21:16:56.131626 249972 usertrap_amd64.go:225] [ 18708: 18708] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.132109 249972 usertrap_amd64.go:212] [ 18708: 18708] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.132138 249972 usertrap_amd64.go:122] [ 18708: 18708] Allocate a new trap: 0xc007c40570 40 D0323 21:16:56.132153 249972 usertrap_amd64.go:225] [ 18708: 18708] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.132514 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.132669 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.138245 249972 usertrap_amd64.go:212] [ 18708: 18708] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.138274 249972 usertrap_amd64.go:122] [ 18708: 18708] Allocate a new trap: 0xc007c40570 41 D0323 21:16:56.138287 249972 usertrap_amd64.go:225] [ 18708: 18708] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.146164 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.146734 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.153027 249972 usertrap_amd64.go:212] [ 18708: 18708] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.153076 249972 usertrap_amd64.go:122] [ 18708: 18708] Allocate a new trap: 0xc007c40570 42 D0323 21:16:56.153092 249972 usertrap_amd64.go:225] [ 18708: 18708] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.153604 249972 task_exit.go:204] [ 18708: 18708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.153633 249972 task_exit.go:204] [ 18708: 18708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.153709 249972 task_signals.go:204] [ 18708: 18709] Signal 18708, PID: 18709, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.153736 249972 task_exit.go:204] [ 18708: 18709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.155462 249972 task_exit.go:204] [ 18708: 18709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.155503 249972 task_exit.go:204] [ 18708: 18709] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.155523 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.157097 249972 task_exit.go:204] [ 18708: 18708] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) ioctl$VT_GETMODE(r0, 0x4b62, &(0x7f0000000000)) D0323 21:16:56.158392 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.158553 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.165975 249972 usertrap_amd64.go:212] [ 18710: 18710] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.166006 249972 usertrap_amd64.go:122] [ 18710: 18710] Allocate a new trap: 0xc005a86000 39 D0323 21:16:56.166144 249972 usertrap_amd64.go:225] [ 18710: 18710] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.166733 249972 usertrap_amd64.go:212] [ 18710: 18710] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.166763 249972 usertrap_amd64.go:122] [ 18710: 18710] Allocate a new trap: 0xc005a86000 40 D0323 21:16:56.166773 249972 usertrap_amd64.go:225] [ 18710: 18710] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.167743 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.167989 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.171667 249972 usertrap_amd64.go:212] [ 18710: 18710] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.171691 249972 usertrap_amd64.go:122] [ 18710: 18710] Allocate a new trap: 0xc005a86000 41 D0323 21:16:56.171701 249972 usertrap_amd64.go:225] [ 18710: 18710] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.179251 249972 usertrap_amd64.go:212] [ 18710: 18711] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.179275 249972 usertrap_amd64.go:122] [ 18710: 18711] Allocate a new trap: 0xc005a86000 42 D0323 21:16:56.179286 249972 usertrap_amd64.go:225] [ 18710: 18711] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.179851 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.180025 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.184265 249972 usertrap_amd64.go:212] [ 18710: 18710] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.184332 249972 usertrap_amd64.go:122] [ 18710: 18710] Allocate a new trap: 0xc005a86000 43 D0323 21:16:56.184372 249972 usertrap_amd64.go:225] [ 18710: 18710] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.185133 249972 task_exit.go:204] [ 18710: 18710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.185174 249972 task_exit.go:204] [ 18710: 18710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.185550 249972 task_signals.go:204] [ 18710: 18711] Signal 18710, PID: 18711, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.185574 249972 task_exit.go:204] [ 18710: 18711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.187875 249972 task_exit.go:204] [ 18710: 18711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.187896 249972 task_exit.go:204] [ 18710: 18711] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.187907 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.188347 249972 task_exit.go:204] [ 18710: 18710] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x8904, 0x0) D0323 21:16:56.197610 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.197800 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.207671 249972 usertrap_amd64.go:212] [ 18712: 18712] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.207701 249972 usertrap_amd64.go:122] [ 18712: 18712] Allocate a new trap: 0xc005a862a0 39 D0323 21:16:56.207828 249972 usertrap_amd64.go:225] [ 18712: 18712] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.208627 249972 usertrap_amd64.go:212] [ 18712: 18712] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.208650 249972 usertrap_amd64.go:122] [ 18712: 18712] Allocate a new trap: 0xc005a862a0 40 D0323 21:16:56.208669 249972 usertrap_amd64.go:225] [ 18712: 18712] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.209107 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.209261 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.212647 249972 usertrap_amd64.go:212] [ 18712: 18712] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.212667 249972 usertrap_amd64.go:122] [ 18712: 18712] Allocate a new trap: 0xc005a862a0 41 D0323 21:16:56.212679 249972 usertrap_amd64.go:225] [ 18712: 18712] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.220139 249972 usertrap_amd64.go:212] [ 18712: 18712] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.220169 249972 usertrap_amd64.go:122] [ 18712: 18712] Allocate a new trap: 0xc005a862a0 42 D0323 21:16:56.220181 249972 usertrap_amd64.go:225] [ 18712: 18712] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.220741 249972 task_exit.go:204] [ 18712: 18712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.220812 249972 task_exit.go:204] [ 18712: 18712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.220842 249972 task_signals.go:204] [ 18712: 18713] Signal 18712, PID: 18713, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.220877 249972 task_exit.go:204] [ 18712: 18713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.222554 249972 task_exit.go:204] [ 18712: 18713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.222597 249972 task_exit.go:204] [ 18712: 18713] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.222613 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.223850 249972 task_exit.go:204] [ 18712: 18712] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fscontext={'fscontext', 0x2c, 'user_u'}}]}}, 0x0, 0x0, 0x0) D0323 21:16:56.227731 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.227908 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.236390 249972 usertrap_amd64.go:212] [ 18714: 18714] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.236422 249972 usertrap_amd64.go:122] [ 18714: 18714] Allocate a new trap: 0xc00a4253e0 39 D0323 21:16:56.236517 249972 usertrap_amd64.go:225] [ 18714: 18714] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.237509 249972 usertrap_amd64.go:212] [ 18714: 18714] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.237541 249972 usertrap_amd64.go:122] [ 18714: 18714] Allocate a new trap: 0xc00a4253e0 40 D0323 21:16:56.237553 249972 usertrap_amd64.go:225] [ 18714: 18714] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.238301 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.238456 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.242136 249972 usertrap_amd64.go:212] [ 18714: 18714] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.242164 249972 usertrap_amd64.go:122] [ 18714: 18714] Allocate a new trap: 0xc00a4253e0 41 D0323 21:16:56.242174 249972 usertrap_amd64.go:225] [ 18714: 18714] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.253550 249972 usertrap_amd64.go:212] [ 18714: 18714] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.253578 249972 usertrap_amd64.go:122] [ 18714: 18714] Allocate a new trap: 0xc00a4253e0 42 D0323 21:16:56.253592 249972 usertrap_amd64.go:225] [ 18714: 18714] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.254176 249972 task_exit.go:204] [ 18714: 18714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.254221 249972 task_exit.go:204] [ 18714: 18714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.254368 249972 task_signals.go:204] [ 18714: 18715] Signal 18714, PID: 18715, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.254438 249972 task_exit.go:204] [ 18714: 18715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.256058 249972 task_exit.go:204] [ 18714: 18715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.256172 249972 task_exit.go:204] [ 18714: 18715] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.256237 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.257947 249972 task_exit.go:204] [ 18714: 18714] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.259108 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.259993 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x35}]}) D0323 21:16:56.270392 249972 usertrap_amd64.go:212] [ 18716: 18716] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.270444 249972 usertrap_amd64.go:122] [ 18716: 18716] Allocate a new trap: 0xc00a425590 39 D0323 21:16:56.270585 249972 usertrap_amd64.go:225] [ 18716: 18716] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.271868 249972 usertrap_amd64.go:212] [ 18716: 18716] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.271906 249972 usertrap_amd64.go:122] [ 18716: 18716] Allocate a new trap: 0xc00a425590 40 D0323 21:16:56.271921 249972 usertrap_amd64.go:225] [ 18716: 18716] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.272657 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.272881 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.276068 249972 usertrap_amd64.go:212] [ 18716: 18716] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.276090 249972 usertrap_amd64.go:122] [ 18716: 18716] Allocate a new trap: 0xc00a425590 41 D0323 21:16:56.276103 249972 usertrap_amd64.go:225] [ 18716: 18716] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.281187 249972 sys_seccomp.go:68] [ 18716: 18717] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0323 21:16:56.281695 249972 usertrap_amd64.go:212] [ 18716: 18716] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.281760 249972 usertrap_amd64.go:122] [ 18716: 18716] Allocate a new trap: 0xc00a425590 42 D0323 21:16:56.281778 249972 usertrap_amd64.go:225] [ 18716: 18716] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.282190 249972 task_exit.go:204] [ 18716: 18716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.282238 249972 task_signals.go:204] [ 18716: 18717] Signal 18716, PID: 18717, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.282258 249972 task_exit.go:204] [ 18716: 18716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.282314 249972 task_exit.go:204] [ 18716: 18717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.284428 249972 task_exit.go:204] [ 18716: 18717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.284459 249972 task_exit.go:204] [ 18716: 18717] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.284483 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 21:16:56 executing program 0: socket$inet6_tcp(0x10, 0x2, 0x4) D0323 21:16:56.285102 249972 task_exit.go:204] [ 18716: 18716] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.285743 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.285880 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.295613 249972 usertrap_amd64.go:212] [ 18718: 18718] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.295647 249972 usertrap_amd64.go:122] [ 18718: 18718] Allocate a new trap: 0xc008f8d740 39 D0323 21:16:56.295719 249972 usertrap_amd64.go:225] [ 18718: 18718] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.298899 249972 usertrap_amd64.go:212] [ 18718: 18718] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.298933 249972 usertrap_amd64.go:122] [ 18718: 18718] Allocate a new trap: 0xc008f8d740 40 D0323 21:16:56.298948 249972 usertrap_amd64.go:225] [ 18718: 18718] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.299539 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.300065 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.303212 249972 usertrap_amd64.go:212] [ 18718: 18718] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.303237 249972 usertrap_amd64.go:122] [ 18718: 18718] Allocate a new trap: 0xc008f8d740 41 D0323 21:16:56.303252 249972 usertrap_amd64.go:225] [ 18718: 18718] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.311018 249972 usertrap_amd64.go:212] [ 18718: 18718] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.311061 249972 usertrap_amd64.go:122] [ 18718: 18718] Allocate a new trap: 0xc008f8d740 42 D0323 21:16:56.311078 249972 usertrap_amd64.go:225] [ 18718: 18718] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.311602 249972 task_exit.go:204] [ 18718: 18718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.311645 249972 task_exit.go:204] [ 18718: 18718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.311708 249972 task_signals.go:204] [ 18718: 18719] Signal 18718, PID: 18719, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.311739 249972 task_exit.go:204] [ 18718: 18719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.313361 249972 task_exit.go:204] [ 18718: 18719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.313678 249972 task_exit.go:204] [ 18718: 18719] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.313801 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.314213 249972 task_exit.go:204] [ 18718: 18718] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: statx(0xffffffffffffffff, &(0x7f0000000440)='\x00', 0x1000, 0x0, 0x0) D0323 21:16:56.316106 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.316234 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.324891 249972 usertrap_amd64.go:212] [ 18720: 18720] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.324931 249972 usertrap_amd64.go:122] [ 18720: 18720] Allocate a new trap: 0xc009027890 39 D0323 21:16:56.325066 249972 usertrap_amd64.go:225] [ 18720: 18720] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.326006 249972 usertrap_amd64.go:212] [ 18720: 18720] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.326043 249972 usertrap_amd64.go:122] [ 18720: 18720] Allocate a new trap: 0xc009027890 40 D0323 21:16:56.326059 249972 usertrap_amd64.go:225] [ 18720: 18720] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.328735 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.329050 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.331633 249972 usertrap_amd64.go:212] [ 18720: 18720] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.331668 249972 usertrap_amd64.go:122] [ 18720: 18720] Allocate a new trap: 0xc009027890 41 D0323 21:16:56.331682 249972 usertrap_amd64.go:225] [ 18720: 18720] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.337970 249972 usertrap_amd64.go:212] [ 18720: 18720] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.337996 249972 usertrap_amd64.go:122] [ 18720: 18720] Allocate a new trap: 0xc009027890 42 D0323 21:16:56.338010 249972 usertrap_amd64.go:225] [ 18720: 18720] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.338719 249972 task_exit.go:204] [ 18720: 18720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.338743 249972 task_exit.go:204] [ 18720: 18720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.340043 249972 task_signals.go:204] [ 18720: 18721] Signal 18720, PID: 18721, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.340064 249972 task_exit.go:204] [ 18720: 18721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.340762 249972 task_exit.go:204] [ 18720: 18721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.340776 249972 task_exit.go:204] [ 18720: 18721] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.340787 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.341957 249972 task_exit.go:204] [ 18720: 18720] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: socketpair(0xc, 0x0, 0x0, &(0x7f00000004c0)) D0323 21:16:56.349281 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.349415 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.357261 249972 usertrap_amd64.go:212] [ 18722: 18722] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.357284 249972 usertrap_amd64.go:122] [ 18722: 18722] Allocate a new trap: 0xc00a425710 39 D0323 21:16:56.357388 249972 usertrap_amd64.go:225] [ 18722: 18722] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.357848 249972 usertrap_amd64.go:212] [ 18722: 18722] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.357871 249972 usertrap_amd64.go:122] [ 18722: 18722] Allocate a new trap: 0xc00a425710 40 D0323 21:16:56.357887 249972 usertrap_amd64.go:225] [ 18722: 18722] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.358329 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.358516 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.361326 249972 usertrap_amd64.go:212] [ 18722: 18722] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.361351 249972 usertrap_amd64.go:122] [ 18722: 18722] Allocate a new trap: 0xc00a425710 41 D0323 21:16:56.361361 249972 usertrap_amd64.go:225] [ 18722: 18722] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.367153 249972 usertrap_amd64.go:212] [ 18722: 18722] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.367205 249972 usertrap_amd64.go:122] [ 18722: 18722] Allocate a new trap: 0xc00a425710 42 D0323 21:16:56.367223 249972 usertrap_amd64.go:225] [ 18722: 18722] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.369156 249972 task_exit.go:204] [ 18722: 18722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.369190 249972 task_exit.go:204] [ 18722: 18722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.369505 249972 task_signals.go:204] [ 18722: 18723] Signal 18722, PID: 18723, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.369546 249972 task_exit.go:204] [ 18722: 18723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.370586 249972 task_exit.go:204] [ 18722: 18723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.370612 249972 task_exit.go:204] [ 18722: 18723] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.370622 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.372074 249972 task_exit.go:204] [ 18722: 18722] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b68, 0x0) D0323 21:16:56.373697 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.373868 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.388983 249972 usertrap_amd64.go:212] [ 18724: 18724] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.389018 249972 usertrap_amd64.go:122] [ 18724: 18724] Allocate a new trap: 0xc00a425980 39 D0323 21:16:56.389143 249972 usertrap_amd64.go:225] [ 18724: 18724] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.390032 249972 usertrap_amd64.go:212] [ 18724: 18724] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.390096 249972 usertrap_amd64.go:122] [ 18724: 18724] Allocate a new trap: 0xc00a425980 40 D0323 21:16:56.390140 249972 usertrap_amd64.go:225] [ 18724: 18724] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.390583 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.390781 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.394107 249972 usertrap_amd64.go:212] [ 18724: 18724] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.394149 249972 usertrap_amd64.go:122] [ 18724: 18724] Allocate a new trap: 0xc00a425980 41 D0323 21:16:56.394165 249972 usertrap_amd64.go:225] [ 18724: 18724] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.401126 249972 usertrap_amd64.go:212] [ 18724: 18725] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.401149 249972 usertrap_amd64.go:122] [ 18724: 18725] Allocate a new trap: 0xc00a425980 42 D0323 21:16:56.401163 249972 usertrap_amd64.go:225] [ 18724: 18725] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.401693 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.401897 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.404080 249972 usertrap_amd64.go:212] [ 18724: 18724] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.404148 249972 usertrap_amd64.go:122] [ 18724: 18724] Allocate a new trap: 0xc00a425980 43 D0323 21:16:56.404173 249972 usertrap_amd64.go:225] [ 18724: 18724] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.404628 249972 task_exit.go:204] [ 18724: 18724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.404664 249972 task_exit.go:204] [ 18724: 18724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.404680 249972 task_signals.go:204] [ 18724: 18725] Signal 18724, PID: 18725, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.404707 249972 task_exit.go:204] [ 18724: 18725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.406112 249972 task_exit.go:204] [ 18724: 18725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.406141 249972 task_exit.go:204] [ 18724: 18725] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.406158 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.407207 249972 task_exit.go:204] [ 18724: 18724] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x5423, &(0x7f0000000040)) D0323 21:16:56.408884 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.409084 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.421191 249972 usertrap_amd64.go:212] [ 18726: 18726] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.421227 249972 usertrap_amd64.go:122] [ 18726: 18726] Allocate a new trap: 0xc008f8da40 39 D0323 21:16:56.421547 249972 usertrap_amd64.go:225] [ 18726: 18726] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.423978 249972 usertrap_amd64.go:212] [ 18726: 18726] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.424011 249972 usertrap_amd64.go:122] [ 18726: 18726] Allocate a new trap: 0xc008f8da40 40 D0323 21:16:56.424025 249972 usertrap_amd64.go:225] [ 18726: 18726] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.424708 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.425515 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.429653 249972 usertrap_amd64.go:212] [ 18726: 18726] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.429684 249972 usertrap_amd64.go:122] [ 18726: 18726] Allocate a new trap: 0xc008f8da40 41 D0323 21:16:56.429698 249972 usertrap_amd64.go:225] [ 18726: 18726] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.443299 249972 usertrap_amd64.go:212] [ 18726: 18727] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.443326 249972 usertrap_amd64.go:122] [ 18726: 18727] Allocate a new trap: 0xc008f8da40 42 D0323 21:16:56.443336 249972 usertrap_amd64.go:225] [ 18726: 18727] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.443694 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.443888 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.446123 249972 usertrap_amd64.go:212] [ 18726: 18726] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.446152 249972 usertrap_amd64.go:122] [ 18726: 18726] Allocate a new trap: 0xc008f8da40 43 D0323 21:16:56.446168 249972 usertrap_amd64.go:225] [ 18726: 18726] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.446484 249972 task_exit.go:204] [ 18726: 18726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.446529 249972 task_exit.go:204] [ 18726: 18726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.446606 249972 task_signals.go:204] [ 18726: 18727] Signal 18726, PID: 18727, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.446641 249972 task_exit.go:204] [ 18726: 18727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.448457 249972 task_exit.go:204] [ 18726: 18727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.448564 249972 task_exit.go:204] [ 18726: 18727] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.448623 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.449167 249972 task_exit.go:204] [ 18726: 18726] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x1) D0323 21:16:56.453482 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.453621 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.465518 249972 usertrap_amd64.go:212] [ 18728: 18728] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.465557 249972 usertrap_amd64.go:122] [ 18728: 18728] Allocate a new trap: 0xc00a425b60 39 D0323 21:16:56.465654 249972 usertrap_amd64.go:225] [ 18728: 18728] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.466234 249972 usertrap_amd64.go:212] [ 18728: 18728] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.466257 249972 usertrap_amd64.go:122] [ 18728: 18728] Allocate a new trap: 0xc00a425b60 40 D0323 21:16:56.466265 249972 usertrap_amd64.go:225] [ 18728: 18728] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.467002 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.467156 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.470011 249972 usertrap_amd64.go:212] [ 18728: 18728] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.470041 249972 usertrap_amd64.go:122] [ 18728: 18728] Allocate a new trap: 0xc00a425b60 41 D0323 21:16:56.470055 249972 usertrap_amd64.go:225] [ 18728: 18728] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.475004 249972 usertrap_amd64.go:212] [ 18728: 18729] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.475029 249972 usertrap_amd64.go:122] [ 18728: 18729] Allocate a new trap: 0xc00a425b60 42 D0323 21:16:56.475037 249972 usertrap_amd64.go:225] [ 18728: 18729] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.475819 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.475991 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.477969 249972 usertrap_amd64.go:212] [ 18728: 18728] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.478005 249972 usertrap_amd64.go:122] [ 18728: 18728] Allocate a new trap: 0xc00a425b60 43 D0323 21:16:56.478026 249972 usertrap_amd64.go:225] [ 18728: 18728] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.478967 249972 task_exit.go:204] [ 18728: 18728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.479040 249972 task_exit.go:204] [ 18728: 18728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.479138 249972 task_signals.go:204] [ 18728: 18729] Signal 18728, PID: 18729, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.479175 249972 task_exit.go:204] [ 18728: 18729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.480474 249972 task_exit.go:204] [ 18728: 18729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.480556 249972 task_exit.go:204] [ 18728: 18729] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.480623 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.481799 249972 task_exit.go:204] [ 18728: 18728] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: syz_clone(0x1600, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) D0323 21:16:56.482624 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.482721 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.490727 249972 usertrap_amd64.go:212] [ 18730: 18730] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.490753 249972 usertrap_amd64.go:122] [ 18730: 18730] Allocate a new trap: 0xc00a425da0 39 D0323 21:16:56.490824 249972 usertrap_amd64.go:225] [ 18730: 18730] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.491501 249972 usertrap_amd64.go:212] [ 18730: 18730] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.491524 249972 usertrap_amd64.go:122] [ 18730: 18730] Allocate a new trap: 0xc00a425da0 40 D0323 21:16:56.491533 249972 usertrap_amd64.go:225] [ 18730: 18730] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.492109 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.492232 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.494688 249972 usertrap_amd64.go:212] [ 18730: 18730] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.494710 249972 usertrap_amd64.go:122] [ 18730: 18730] Allocate a new trap: 0xc00a425da0 41 D0323 21:16:56.494721 249972 usertrap_amd64.go:225] [ 18730: 18730] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.507050 249972 usertrap_amd64.go:212] [ 18730: 18730] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.507077 249972 usertrap_amd64.go:122] [ 18730: 18730] Allocate a new trap: 0xc00a425da0 42 D0323 21:16:56.507143 249972 usertrap_amd64.go:225] [ 18730: 18730] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.507487 249972 task_exit.go:204] [ 18730: 18730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.507520 249972 task_exit.go:204] [ 18730: 18730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.508637 249972 task_signals.go:204] [ 18730: 18731] Signal 18730, PID: 18731, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.508671 249972 task_exit.go:204] [ 18730: 18731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.509065 249972 task_exit.go:204] [ 18730: 18731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.509086 249972 task_exit.go:204] [ 18730: 18731] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.509099 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.509981 249972 task_exit.go:204] [ 18730: 18730] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xcfd3, 0x0, "3be3bf0018a8c392"}) D0323 21:16:56.512138 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.512278 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.512837 249972 usertrap_amd64.go:212] [ 18732: 18732] Found the pattern at ip 560eede3ee1a:sysno 230 D0323 21:16:56.512863 249972 usertrap_amd64.go:122] [ 18732: 18732] Allocate a new trap: 0xc00a425f80 42 D0323 21:16:56.512878 249972 usertrap_amd64.go:225] [ 18732: 18732] Apply the binary patch addr 560eede3ee1a trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.519425 249972 usertrap_amd64.go:212] [ 18733: 18733] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.519449 249972 usertrap_amd64.go:122] [ 18733: 18733] Allocate a new trap: 0xc00a425fb0 39 D0323 21:16:56.519532 249972 usertrap_amd64.go:225] [ 18733: 18733] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.519937 249972 usertrap_amd64.go:212] [ 18733: 18733] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.519954 249972 usertrap_amd64.go:122] [ 18733: 18733] Allocate a new trap: 0xc00a425fb0 40 D0323 21:16:56.519966 249972 usertrap_amd64.go:225] [ 18733: 18733] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.520329 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.520468 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.522981 249972 usertrap_amd64.go:212] [ 18733: 18733] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.523003 249972 usertrap_amd64.go:122] [ 18733: 18733] Allocate a new trap: 0xc00a425fb0 41 D0323 21:16:56.523015 249972 usertrap_amd64.go:225] [ 18733: 18733] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.529703 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.529843 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.531625 249972 usertrap_amd64.go:212] [ 18733: 18733] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.531642 249972 usertrap_amd64.go:122] [ 18733: 18733] Allocate a new trap: 0xc00a425fb0 42 D0323 21:16:56.531653 249972 usertrap_amd64.go:225] [ 18733: 18733] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.532520 249972 task_exit.go:204] [ 18733: 18733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.532545 249972 task_exit.go:204] [ 18733: 18733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.532696 249972 task_signals.go:204] [ 18733: 18734] Signal 18733, PID: 18734, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.532724 249972 task_exit.go:204] [ 18733: 18734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.534239 249972 task_exit.go:204] [ 18733: 18734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.534268 249972 task_exit.go:204] [ 18733: 18734] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.534281 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.535116 249972 task_exit.go:204] [ 18733: 18733] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: socket$inet6_tcp(0x11, 0x3, 0x0) D0323 21:16:56.536887 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.537029 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.547308 249972 usertrap_amd64.go:212] [ 18735: 18735] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.547337 249972 usertrap_amd64.go:122] [ 18735: 18735] Allocate a new trap: 0xc0009ca0c0 39 D0323 21:16:56.547433 249972 usertrap_amd64.go:225] [ 18735: 18735] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.547931 249972 usertrap_amd64.go:212] [ 18735: 18735] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.547959 249972 usertrap_amd64.go:122] [ 18735: 18735] Allocate a new trap: 0xc0009ca0c0 40 D0323 21:16:56.547971 249972 usertrap_amd64.go:225] [ 18735: 18735] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.548465 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.548636 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.551151 249972 usertrap_amd64.go:212] [ 18735: 18735] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.551177 249972 usertrap_amd64.go:122] [ 18735: 18735] Allocate a new trap: 0xc0009ca0c0 41 D0323 21:16:56.551189 249972 usertrap_amd64.go:225] [ 18735: 18735] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.558118 249972 usertrap_amd64.go:212] [ 18735: 18735] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.558190 249972 usertrap_amd64.go:122] [ 18735: 18735] Allocate a new trap: 0xc0009ca0c0 42 D0323 21:16:56.558218 249972 usertrap_amd64.go:225] [ 18735: 18735] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.558530 249972 task_exit.go:204] [ 18735: 18735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.558597 249972 task_exit.go:204] [ 18735: 18735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.559012 249972 task_signals.go:204] [ 18735: 18736] Signal 18735, PID: 18736, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.559049 249972 task_exit.go:204] [ 18735: 18736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.560109 249972 task_exit.go:204] [ 18735: 18736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.560138 249972 task_exit.go:204] [ 18735: 18736] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.560151 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.560265 249972 task_exit.go:204] [ 18735: 18735] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2013061, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) D0323 21:16:56.562239 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.562387 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.571389 249972 usertrap_amd64.go:212] [ 18737: 18737] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.571423 249972 usertrap_amd64.go:122] [ 18737: 18737] Allocate a new trap: 0xc005a86630 39 D0323 21:16:56.571516 249972 usertrap_amd64.go:225] [ 18737: 18737] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.572124 249972 usertrap_amd64.go:212] [ 18737: 18737] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.572225 249972 usertrap_amd64.go:122] [ 18737: 18737] Allocate a new trap: 0xc005a86630 40 D0323 21:16:56.572253 249972 usertrap_amd64.go:225] [ 18737: 18737] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.573582 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.577160 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.580254 249972 usertrap_amd64.go:212] [ 18737: 18737] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.580276 249972 usertrap_amd64.go:122] [ 18737: 18737] Allocate a new trap: 0xc005a86630 41 D0323 21:16:56.580286 249972 usertrap_amd64.go:225] [ 18737: 18737] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.588667 249972 usertrap_amd64.go:212] [ 18737: 18737] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.588698 249972 usertrap_amd64.go:122] [ 18737: 18737] Allocate a new trap: 0xc005a86630 42 D0323 21:16:56.588711 249972 usertrap_amd64.go:225] [ 18737: 18737] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.589199 249972 task_exit.go:204] [ 18737: 18737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.589242 249972 task_exit.go:204] [ 18737: 18737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.589258 249972 task_signals.go:204] [ 18737: 18738] Signal 18737, PID: 18738, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.589292 249972 task_exit.go:204] [ 18737: 18738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.591278 249972 task_exit.go:204] [ 18737: 18738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.591302 249972 task_exit.go:204] [ 18737: 18738] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.591318 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.592782 249972 task_exit.go:204] [ 18737: 18737] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x30}, {}]}) D0323 21:16:56.594512 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.594666 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.613211 249972 usertrap_amd64.go:212] [ 18739: 18739] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.613312 249972 usertrap_amd64.go:122] [ 18739: 18739] Allocate a new trap: 0xc0009ca210 39 D0323 21:16:56.613454 249972 usertrap_amd64.go:225] [ 18739: 18739] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.614153 249972 usertrap_amd64.go:212] [ 18739: 18739] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.614177 249972 usertrap_amd64.go:122] [ 18739: 18739] Allocate a new trap: 0xc0009ca210 40 D0323 21:16:56.614188 249972 usertrap_amd64.go:225] [ 18739: 18739] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.615302 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.615499 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.618670 249972 usertrap_amd64.go:212] [ 18739: 18739] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.618690 249972 usertrap_amd64.go:122] [ 18739: 18739] Allocate a new trap: 0xc0009ca210 41 D0323 21:16:56.618699 249972 usertrap_amd64.go:225] [ 18739: 18739] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.624500 249972 sys_seccomp.go:68] [ 18739: 18740] Invalid seccomp-bpf filter: at l1: last instruction must be a return D0323 21:16:56.625050 249972 usertrap_amd64.go:212] [ 18739: 18739] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.625083 249972 usertrap_amd64.go:122] [ 18739: 18739] Allocate a new trap: 0xc0009ca210 42 D0323 21:16:56.625095 249972 usertrap_amd64.go:225] [ 18739: 18739] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.625407 249972 task_exit.go:204] [ 18739: 18739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.625437 249972 task_exit.go:204] [ 18739: 18739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.625499 249972 task_signals.go:204] [ 18739: 18740] Signal 18739, PID: 18740, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.625521 249972 task_exit.go:204] [ 18739: 18740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.627087 249972 task_exit.go:204] [ 18739: 18740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.627121 249972 task_exit.go:204] [ 18739: 18740] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.627134 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.627930 249972 task_exit.go:204] [ 18739: 18739] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.630045 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.630192 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b69, 0x0) D0323 21:16:56.641287 249972 usertrap_amd64.go:212] [ 18741: 18741] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.641313 249972 usertrap_amd64.go:122] [ 18741: 18741] Allocate a new trap: 0xc0083f23f0 39 D0323 21:16:56.641403 249972 usertrap_amd64.go:225] [ 18741: 18741] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.641778 249972 usertrap_amd64.go:212] [ 18741: 18741] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.641795 249972 usertrap_amd64.go:122] [ 18741: 18741] Allocate a new trap: 0xc0083f23f0 40 D0323 21:16:56.641802 249972 usertrap_amd64.go:225] [ 18741: 18741] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.642894 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.643101 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.645943 249972 usertrap_amd64.go:212] [ 18741: 18741] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.645964 249972 usertrap_amd64.go:122] [ 18741: 18741] Allocate a new trap: 0xc0083f23f0 41 D0323 21:16:56.645976 249972 usertrap_amd64.go:225] [ 18741: 18741] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.652539 249972 usertrap_amd64.go:212] [ 18741: 18742] Found the pattern at ip 560eeddcc27d:sysno 257 D0323 21:16:56.652571 249972 usertrap_amd64.go:122] [ 18741: 18742] Allocate a new trap: 0xc0083f23f0 42 D0323 21:16:56.652583 249972 usertrap_amd64.go:225] [ 18741: 18742] Apply the binary patch addr 560eeddcc27d trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.653114 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.653297 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.655127 249972 usertrap_amd64.go:212] [ 18741: 18741] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.655148 249972 usertrap_amd64.go:122] [ 18741: 18741] Allocate a new trap: 0xc0083f23f0 43 D0323 21:16:56.655155 249972 usertrap_amd64.go:225] [ 18741: 18741] Apply the binary patch addr 560eeddcbfa4 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0323 21:16:56.655408 249972 task_exit.go:204] [ 18741: 18741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.655435 249972 task_exit.go:204] [ 18741: 18741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.655508 249972 task_signals.go:204] [ 18741: 18742] Signal 18741, PID: 18742, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.655533 249972 task_exit.go:204] [ 18741: 18742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.656977 249972 task_exit.go:204] [ 18741: 18742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.656999 249972 task_exit.go:204] [ 18741: 18742] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.657016 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.658166 249972 task_exit.go:204] [ 18741: 18741] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.658709 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.659116 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 21:16:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}) D0323 21:16:56.663577 249972 task_exit.go:204] [ 18732: 18732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.663891 249972 task_exit.go:204] [ 18732: 18732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.663942 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.664265 249972 task_exit.go:204] [ 18732: 18732] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.669412 249972 usertrap_amd64.go:212] [ 18743: 18743] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.669464 249972 usertrap_amd64.go:122] [ 18743: 18743] Allocate a new trap: 0xc0087bef90 39 D0323 21:16:56.669546 249972 usertrap_amd64.go:225] [ 18743: 18743] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.670707 249972 usertrap_amd64.go:212] [ 18743: 18743] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.670734 249972 usertrap_amd64.go:122] [ 18743: 18743] Allocate a new trap: 0xc0087bef90 40 D0323 21:16:56.670746 249972 usertrap_amd64.go:225] [ 18743: 18743] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.671488 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.671906 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.676199 249972 usertrap_amd64.go:212] [ 18743: 18743] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.676221 249972 usertrap_amd64.go:122] [ 18743: 18743] Allocate a new trap: 0xc0087bef90 41 D0323 21:16:56.676232 249972 usertrap_amd64.go:225] [ 18743: 18743] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.682821 249972 usertrap_amd64.go:212] [ 18743: 18743] Found the pattern at ip 560eeddcbfa4:sysno 3 D0323 21:16:56.682890 249972 usertrap_amd64.go:122] [ 18743: 18743] Allocate a new trap: 0xc0087bef90 42 D0323 21:16:56.682905 249972 usertrap_amd64.go:225] [ 18743: 18743] Apply the binary patch addr 560eeddcbfa4 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0323 21:16:56.683524 249972 task_exit.go:204] [ 18743: 18743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.683589 249972 task_exit.go:204] [ 18743: 18743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.683807 249972 task_signals.go:204] [ 18743: 18744] Signal 18743, PID: 18744, TID: 0, fault addr: 0x9: terminating thread group D0323 21:16:56.683845 249972 task_exit.go:204] [ 18743: 18744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 21:16:56.686068 249972 task_exit.go:204] [ 18743: 18744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 21:16:56.686090 249972 task_exit.go:204] [ 18743: 18744] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 21:16:56.686100 249972 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0323 21:16:56.687490 249972 task_exit.go:204] [ 18743: 18743] Transitioning from exit state TaskExitZombie to TaskExitDead 21:16:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETA(r0, 0x5415, 0x0) D0323 21:16:56.690626 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.690764 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.701545 249972 usertrap_amd64.go:212] [ 18745: 18745] Found the pattern at ip 560eede3f490:sysno 109 D0323 21:16:56.701580 249972 usertrap_amd64.go:122] [ 18745: 18745] Allocate a new trap: 0xc0083f24e0 39 D0323 21:16:56.701650 249972 usertrap_amd64.go:225] [ 18745: 18745] Apply the binary patch addr 560eede3f490 trap addr 60c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 12 6 0]) D0323 21:16:56.702275 249972 usertrap_amd64.go:212] [ 18745: 18745] Found the pattern at ip 560eede19a30:sysno 266 D0323 21:16:56.702297 249972 usertrap_amd64.go:122] [ 18745: 18745] Allocate a new trap: 0xc0083f24e0 40 D0323 21:16:56.702305 249972 usertrap_amd64.go:225] [ 18745: 18745] Apply the binary patch addr 560eede19a30 trap addr 60c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 12 6 0]) D0323 21:16:56.703035 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, proc]} D0323 21:16:56.703254 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 21:16:56.706446 249972 usertrap_amd64.go:212] [ 18745: 18745] Found the pattern at ip 560eede1b51a:sysno 56 D0323 21:16:56.706478 249972 usertrap_amd64.go:122] [ 18745: 18745] Allocate a new trap: 0xc0083f24e0 41 D0323 21:16:56.706492 249972 usertrap_amd64.go:225] [ 18745: 18745] Apply the binary patch addr 560eede1b51a trap addr 60cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 12 6 0]) D0323 21:16:56.713333 249972 client.go:400] send [channel 0xc0007b4000] WalkReq{DirFD: 1, Path: [, dev]} D0323 21:16:56.713484 249972 client.go:400] recv [channel 0xc0007b4000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513304, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 21:10:35.566850424 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 21:10:39.206845201 +0000 UTC, Mtime: 2023-03-23 21:10:39.206845201 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} panic: interface conversion: *kernel.Kernel is not unimpl.Events: missing method EmitUnimplementedEvent goroutine 374511 [running]: panic({0x122e8a0, 0xc000b24c30}) GOROOT/src/runtime/panic.go:987 +0x3bb fp=0xc0005d96a0 sp=0xc0005d95e0 pc=0x436afb runtime.getitab(0x1235dc0, 0x13c17c0, 0x0) GOROOT/src/runtime/iface.go:92 +0x1e5 fp=0xc0005d96e8 sp=0xc0005d96a0 pc=0x40aae5 runtime.assertE2I(0x9aba99?, 0x11b6220?) GOROOT/src/runtime/iface.go:453 +0x25 fp=0xc0005d9710 sp=0xc0005d96e8 pc=0x40bac5 gvisor.dev/gvisor/pkg/sentry/unimpl.EmitUnimplementedEvent({0x1637ff8, 0xc00a891500}) pkg/sentry/unimpl/events.go:44 +0x66 fp=0xc0005d9750 sp=0xc0005d9710 pc=0x974f26 gvisor.dev/gvisor/pkg/sentry/fsimpl/devpts.maybeEmitUnimplementedEvent({0x1637ff8?, 0xc00a891500?}, 0x815e420?) pkg/sentry/fsimpl/devpts/master.go:247 +0x105 fp=0xc0005d9770 sp=0xc0005d9750 pc=0xda2505 gvisor.dev/gvisor/pkg/sentry/fsimpl/devpts.(*masterFileDescription).Ioctl(0xc005a0f780, {0x1637ff8, 0xc00a891500}, {0x16324d0, 0xc0055c3000}, {{0x3}, {0x5415}, {0x0}, {0x0}, {0x0}, ...}) pkg/sentry/fsimpl/devpts/master.go:196 +0x5c7 fp=0xc0005d9818 sp=0xc0005d9770 pc=0xda2027 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).Ioctl(...) pkg/sentry/vfs/file_description.go:712 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Ioctl(0xc00a891500, 0x0?, {{0x3}, {0x5415}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_file.go:286 +0x503 fp=0xc0005d9918 sp=0xc0005d9818 pc=0xb21443 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00a891500, 0x10, {{0x3}, {0x5415}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b fp=0xc0005d9c58 sp=0xc0005d9918 pc=0x9c9fab gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00a891500, 0xc0018a7aa0?, {{0x3}, {0x5415}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 fp=0xc0005d9cb8 sp=0xc0005d9c58 pc=0x9cb594 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc0005d9e00?, 0xd05e25?, {{0x3}, {0x5415}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 fp=0xc0005d9d18 sp=0xc0005d9cb8 pc=0x9cb185 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc007cd9340?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac fp=0xc0005d9e10 sp=0xc0005d9d18 pc=0x9cae4c gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc005a0f700?, 0xc00a891500) pkg/sentry/kernel/task_run.go:269 +0x144a fp=0xc0005d9f48 sp=0xc0005d9e10 pc=0x9bc9ca gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00a891500, 0x493a) pkg/sentry/kernel/task_run.go:98 +0x25c fp=0xc0005d9fc0 sp=0xc0005d9f48 pc=0x9bae7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x2a fp=0xc0005d9fe0 sp=0xc0005d9fc0 pc=0x9c842a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005d9fe8 sp=0xc0005d9fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 1 [semacquire, 6 minutes]: runtime.gopark(0xc00021d800?, 0xc0000429b0?, 0x0?, 0x0?, 0x3?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cd2c8 sp=0xc0004cd2a8 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc000020c10, 0x68?, 0x1, 0x0, 0x88?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc0004cd330 sp=0xc0004cd2c8 pc=0x44b32f sync.runtime_Semacquire(0xc0004cd398?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc0004cd368 sp=0xc0004cd330 pc=0x468d27 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x4b fp=0xc0004cd390 sp=0xc0004cd368 pc=0x4799cb gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1112 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000196380) runsc/boot/loader.go:1141 +0x38 fp=0xc0004cd3a8 sp=0xc0004cd390 pc=0xead998 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00049ec60, {0xc000222100?, 0xc000272c40?}, 0xc00021c480, {0xc000272c40, 0x2, 0x1b?}) runsc/cmd/boot.go:443 +0x1625 fp=0xc0004cd898 sp=0xc0004cd3a8 pc=0x10d1ce5 github.com/google/subcommands.(*Commander).Execute(0xc000224000, {0x162c358, 0xc000210000}, {0xc000272c40, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x3a2 fp=0xc0004cd938 sp=0xc0004cd898 pc=0x513fe2 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main({0x1617034, 0x5}) runsc/cli/main.go:253 +0x69e5 fp=0xc0004cdf60 sp=0xc0004cd938 pc=0x1108745 main.main() runsc/main.go:23 +0x27 fp=0xc0004cdf80 sp=0xc0004cdf60 pc=0x1108d07 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc0004cdfe0 sp=0xc0004cdf80 pc=0x4398e7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cdfe8 sp=0xc0004cdfe0 pc=0x46d561 goroutine 2 [force gc (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012cfb0 sp=0xc00012cf90 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc00012cfe0 sp=0xc00012cfb0 pc=0x439b50 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012cfe8 sp=0xc00012cfe0 pc=0x46d561 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 17 [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128780 sp=0xc000128760 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc0001287c8 sp=0xc000128780 pc=0x42435e runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc0001287e0 sp=0xc0001287c8 pc=0x419526 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001287e8 sp=0xc0001287e0 pc=0x46d561 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 18 [GC scavenge wait]: runtime.gopark(0x71d2d2ed9e496?, 0x115e5e?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128f70 sp=0xc000128f50 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x219ace0) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000128fa0 sp=0xc000128f70 pc=0x422253 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000128fc8 sp=0xc000128fa0 pc=0x422845 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000128fe0 sp=0xc000128fc8 pc=0x4194c6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000128fe8 sp=0xc000128fe0 pc=0x46d561 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 33 [finalizer wait, 6 minutes]: runtime.gopark(0x43a092?, 0x7fde4da1a968?, 0x0?, 0x0?, 0xc00012c770?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012c628 sp=0xc00012c608 pc=0x439d16 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x107 fp=0xc00012c7e0 sp=0xc00012c628 pc=0x4184e7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012c7e8 sp=0xc00012c7e0 pc=0x46d561 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 34 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ba750 sp=0xc0004ba730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ba7e0 sp=0xc0004ba750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ba7e8 sp=0xc0004ba7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004baf50 sp=0xc0004baf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bafe0 sp=0xc0004baf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bafe8 sp=0xc0004bafe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129750 sp=0xc000129730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001297e0 sp=0xc000129750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001297e8 sp=0xc0001297e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129f50 sp=0xc000129f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000129fe0 sp=0xc000129f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000129fe8 sp=0xc000129fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 3 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012d750 sp=0xc00012d730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012d7e0 sp=0xc00012d750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012d7e8 sp=0xc00012d7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bb750 sp=0xc0004bb730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bb7e0 sp=0xc0004bb750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bb7e8 sp=0xc0004bb7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 4 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012df50 sp=0xc00012df30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012dfe0 sp=0xc00012df50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012dfe8 sp=0xc00012dfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012a750 sp=0xc00012a730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012a7e0 sp=0xc00012a750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012a7e8 sp=0xc00012a7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bbf50 sp=0xc0004bbf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bbfe0 sp=0xc0004bbf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bbfe8 sp=0xc0004bbfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 5 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012e750 sp=0xc00012e730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012e7e0 sp=0xc00012e750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012e7e8 sp=0xc00012e7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012af50 sp=0xc00012af30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012afe0 sp=0xc00012af50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012afe8 sp=0xc00012afe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bc750 sp=0xc0004bc730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bc7e0 sp=0xc0004bc750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bc7e8 sp=0xc0004bc7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 6 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ef50 sp=0xc00012ef30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012efe0 sp=0xc00012ef50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012efe8 sp=0xc00012efe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012b750 sp=0xc00012b730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012b7e0 sp=0xc00012b750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012b7e8 sp=0xc00012b7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012f750 sp=0xc00012f730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012f7e0 sp=0xc00012f750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012f7e8 sp=0xc00012f7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bcf50 sp=0xc0004bcf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bcfe0 sp=0xc0004bcf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bcfe8 sp=0xc0004bcfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012bf50 sp=0xc00012bf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012bfe0 sp=0xc00012bf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012bfe8 sp=0xc00012bfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ff50 sp=0xc00012ff30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012ffe0 sp=0xc00012ff50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012ffe8 sp=0xc00012ffe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b6750 sp=0xc0004b6730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b67e0 sp=0xc0004b6750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b67e8 sp=0xc0004b67e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506750 sp=0xc000506730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005067e0 sp=0xc000506750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005067e8 sp=0xc0005067e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506f50 sp=0xc000506f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000506fe0 sp=0xc000506f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507750 sp=0xc000507730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005077e0 sp=0xc000507750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005077e8 sp=0xc0005077e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502750 sp=0xc000502730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005027e0 sp=0xc000502750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005027e8 sp=0xc0005027e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507f50 sp=0xc000507f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000507fe0 sp=0xc000507f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508750 sp=0xc000508730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005087e0 sp=0xc000508750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005087e8 sp=0xc0005087e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508f50 sp=0xc000508f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000508fe0 sp=0xc000508f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000508fe8 sp=0xc000508fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000509750 sp=0xc000509730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005097e0 sp=0xc000509750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005097e8 sp=0xc0005097e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000509f50 sp=0xc000509f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000509fe0 sp=0xc000509f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000509fe8 sp=0xc000509fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b6f50 sp=0xc0004b6f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b6fe0 sp=0xc0004b6f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b6fe8 sp=0xc0004b6fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000512750 sp=0xc000512730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005127e0 sp=0xc000512750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005127e8 sp=0xc0005127e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b7750 sp=0xc0004b7730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b77e0 sp=0xc0004b7750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b77e8 sp=0xc0004b77e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000512f50 sp=0xc000512f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000512fe0 sp=0xc000512f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000512fe8 sp=0xc000512fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b7f50 sp=0xc0004b7f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b7fe0 sp=0xc0004b7f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b7fe8 sp=0xc0004b7fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000513750 sp=0xc000513730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005137e0 sp=0xc000513750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005137e8 sp=0xc0005137e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b8750 sp=0xc0004b8730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b87e0 sp=0xc0004b8750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b87e8 sp=0xc0004b87e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000513f50 sp=0xc000513f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000513fe0 sp=0xc000513f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000513fe8 sp=0xc000513fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b8f50 sp=0xc0004b8f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b8fe0 sp=0xc0004b8f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b8fe8 sp=0xc0004b8fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b9750 sp=0xc0004b9730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b97e0 sp=0xc0004b9750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b97e8 sp=0xc0004b97e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b9f50 sp=0xc0004b9f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b9fe0 sp=0xc0004b9f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b9fe8 sp=0xc0004b9fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00050e750 sp=0xc00050e730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00050e7e0 sp=0xc00050e750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00050e7e8 sp=0xc00050e7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 61 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000514750 sp=0xc000514730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005147e0 sp=0xc000514750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005147e8 sp=0xc0005147e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 62 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000514f50 sp=0xc000514f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000514fe0 sp=0xc000514f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000514fe8 sp=0xc000514fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 63 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000515750 sp=0xc000515730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005157e0 sp=0xc000515750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005157e8 sp=0xc0005157e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 64 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000515f50 sp=0xc000515f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000515fe0 sp=0xc000515f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000515fe8 sp=0xc000515fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051a750 sp=0xc00051a730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051a7e0 sp=0xc00051a750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051a7e8 sp=0xc00051a7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051af50 sp=0xc00051af30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051afe0 sp=0xc00051af50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051afe8 sp=0xc00051afe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051b750 sp=0xc00051b730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051b7e0 sp=0xc00051b750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051b7e8 sp=0xc00051b7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051bf50 sp=0xc00051bf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051bfe0 sp=0xc00051bf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051bfe8 sp=0xc00051bfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051c750 sp=0xc00051c730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051c7e0 sp=0xc00051c750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051c7e8 sp=0xc00051c7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051cf50 sp=0xc00051cf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051cfe0 sp=0xc00051cf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051cfe8 sp=0xc00051cfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502f50 sp=0xc000502f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000502fe0 sp=0xc000502f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503750 sp=0xc000503730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005037e0 sp=0xc000503750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005037e8 sp=0xc0005037e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00050ef50 sp=0xc00050ef30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00050efe0 sp=0xc00050ef50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00050efe8 sp=0xc00050efe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503f50 sp=0xc000503f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000503fe0 sp=0xc000503f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051d750 sp=0xc00051d730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051d7e0 sp=0xc00051d750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051d7e8 sp=0xc00051d7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00051df50 sp=0xc00051df30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00051dfe0 sp=0xc00051df50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00051dfe8 sp=0xc00051dfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00050f750 sp=0xc00050f730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00050f7e0 sp=0xc00050f750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00050f7e8 sp=0xc00050f7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000516750 sp=0xc000516730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005167e0 sp=0xc000516750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005167e8 sp=0xc0005167e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504750 sp=0xc000504730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005047e0 sp=0xc000504750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005047e8 sp=0xc0005047e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00050ff50 sp=0xc00050ff30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00050ffe0 sp=0xc00050ff50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00050ffe8 sp=0xc00050ffe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000516f50 sp=0xc000516f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000516fe0 sp=0xc000516f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000516fe8 sp=0xc000516fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504f50 sp=0xc000504f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000504fe0 sp=0xc000504f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000510750 sp=0xc000510730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005107e0 sp=0xc000510750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005107e8 sp=0xc0005107e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000517750 sp=0xc000517730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005177e0 sp=0xc000517750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005177e8 sp=0xc0005177e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000510f50 sp=0xc000510f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000510fe0 sp=0xc000510f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000510fe8 sp=0xc000510fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000517f50 sp=0xc000517f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000517fe0 sp=0xc000517f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000517fe8 sp=0xc000517fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505750 sp=0xc000505730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005057e0 sp=0xc000505750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005057e8 sp=0xc0005057e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505f50 sp=0xc000505f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000505fe0 sp=0xc000505f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000511750 sp=0xc000511730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005117e0 sp=0xc000511750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005117e8 sp=0xc0005117e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 97 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015a750 sp=0xc00015a730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015a7e0 sp=0xc00015a750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015a7e8 sp=0xc00015a7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 93 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000518750 sp=0xc000518730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005187e0 sp=0xc000518750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005187e8 sp=0xc0005187e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle), 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015af50 sp=0xc00015af30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015afe0 sp=0xc00015af50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015afe8 sp=0xc00015afe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x71d39da632ec5?, 0x1?, 0x51?, 0x73?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000511f50 sp=0xc000511f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000511fe0 sp=0xc000511f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000511fe8 sp=0xc000511fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 94 [GC worker (idle), 1 minutes]: runtime.gopark(0x21ce6c0?, 0x1?, 0x59?, 0x56?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000518f50 sp=0xc000518f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000518fe0 sp=0xc000518f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000518fe8 sp=0xc000518fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle)]: runtime.gopark(0x71d39dab3da37?, 0x1?, 0x28?, 0x7a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015b750 sp=0xc00015b730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015b7e0 sp=0xc00015b750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015b7e8 sp=0xc00015b7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x71d39dab3d2c1?, 0x1?, 0xf8?, 0x2c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000156750 sp=0xc000156730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001567e0 sp=0xc000156750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001567e8 sp=0xc0001567e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 95 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xb2?, 0xbc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000519750 sp=0xc000519730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005197e0 sp=0xc000519750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005197e8 sp=0xc0005197e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 96 [GC worker (idle), 2 minutes]: runtime.gopark(0x71d14167b8c3c?, 0x1?, 0x4b?, 0xcb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000519f50 sp=0xc000519f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000519fe0 sp=0xc000519f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000519fe8 sp=0xc000519fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x71d39dab4a98e?, 0x3?, 0xe4?, 0x11?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000156f50 sp=0xc000156f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000156fe0 sp=0xc000156f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000156fe8 sp=0xc000156fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x71d39da64f223?, 0x1?, 0x99?, 0x35?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000157750 sp=0xc000157730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001577e0 sp=0xc000157750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001577e8 sp=0xc0001577e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x80?, 0x91?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000157f50 sp=0xc000157f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000157fe0 sp=0xc000157f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000157fe8 sp=0xc000157fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 113 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x1a?, 0x22?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000524750 sp=0xc000524730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005247e0 sp=0xc000524750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005247e8 sp=0xc0005247e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x27?, 0x9a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000158750 sp=0xc000158730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001587e0 sp=0xc000158750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001587e8 sp=0xc0001587e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xa6?, 0x7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015bf50 sp=0xc00015bf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015bfe0 sp=0xc00015bf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015bfe8 sp=0xc00015bfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x4d?, 0xca?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000158f50 sp=0xc000158f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000158fe0 sp=0xc000158f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000158fe8 sp=0xc000158fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle)]: runtime.gopark(0x71d39da648c4d?, 0x1?, 0x78?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015c750 sp=0xc00015c730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015c7e0 sp=0xc00015c750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015c7e8 sp=0xc00015c7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0x71d39da65ca9f?, 0x1?, 0xea?, 0xd8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000159750 sp=0xc000159730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001597e0 sp=0xc000159750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001597e8 sp=0xc0001597e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle)]: runtime.gopark(0x71d39da65c685?, 0x1?, 0xee?, 0x70?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000524f50 sp=0xc000524f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000524fe0 sp=0xc000524f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000524fe8 sp=0xc000524fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle)]: runtime.gopark(0x71d39da63c6e1?, 0x1?, 0x5f?, 0x5a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015cf50 sp=0xc00015cf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015cfe0 sp=0xc00015cf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015cfe8 sp=0xc00015cfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x5c?, 0xbd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000525750 sp=0xc000525730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005257e0 sp=0xc000525750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005257e8 sp=0xc0005257e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 103 [GC worker (idle)]: runtime.gopark(0x71d39da643f9f?, 0x1?, 0xb3?, 0x66?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015d750 sp=0xc00015d730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015d7e0 sp=0xc00015d750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015d7e8 sp=0xc00015d7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 116 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xe2?, 0xd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000525f50 sp=0xc000525f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000525fe0 sp=0xc000525f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000525fe8 sp=0xc000525fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x76?, 0xc4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000159f50 sp=0xc000159f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000159fe0 sp=0xc000159f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000159fe8 sp=0xc000159fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 117 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xb0?, 0xdd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000526750 sp=0xc000526730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005267e0 sp=0xc000526750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005267e8 sp=0xc0005267e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 104 [GC worker (idle)]: runtime.gopark(0x71d2d2e8aa3d7?, 0x1?, 0x24?, 0x18?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00015df50 sp=0xc00015df30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00015dfe0 sp=0xc00015df50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00015dfe8 sp=0xc00015dfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 129 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x0?, 0x3b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000520750 sp=0xc000520730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005207e0 sp=0xc000520750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005207e8 sp=0xc0005207e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 105 [sync.Cond.Wait]: runtime.gopark(0x0?, 0xc0004a1c20?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000521d88 sp=0xc000521d68 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc0004a2230, 0x48bd) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc000521dd0 sp=0xc000521d88 pc=0x4690ec sync.(*Cond).Wait(0xc0004a1c00?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc000521e08 sp=0xc000521dd0 pc=0x47606c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0004a1c00) pkg/sentry/pgalloc/pgalloc.go:1276 +0x13e fp=0xc000521e78 sp=0xc000521e08 pc=0x7b64de gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0004a1c00) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 fp=0xc000521fc8 sp=0xc000521e78 pc=0x7b5a45 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x26 fp=0xc000521fe0 sp=0xc000521fc8 pc=0x7b0666 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000521fe8 sp=0xc000521fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 106 [chan receive, 1 minutes]: runtime.gopark(0xc00019a000?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bcee0 sp=0xc0001bcec0 pc=0x439d16 runtime.chanrecv(0xc000201b60, 0xc0001bcfc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x49d fp=0xc0001bcf70 sp=0xc0001bcee0 pc=0x40701d runtime.chanrecv2(0xc0001961c0?, 0x124f8c0?) GOROOT/src/runtime/chan.go:447 +0x18 fp=0xc0001bcf98 sp=0xc0001bcf70 pc=0x406b58 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 fp=0xc0001bcfe0 sp=0xc0001bcf98 pc=0xcfc9f7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bcfe8 sp=0xc0001bcfe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2c5 goroutine 107 [sync.Cond.Wait]: runtime.gopark(0x0?, 0xc000212e20?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d4d88 sp=0xc0004d4d68 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc000213430, 0x2da1) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc0004d4dd0 sp=0xc0004d4d88 pc=0x4690ec sync.(*Cond).Wait(0xc000212e00?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc0004d4e08 sp=0xc0004d4dd0 pc=0x47606c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000212e00) pkg/sentry/pgalloc/pgalloc.go:1276 +0x13e fp=0xc0004d4e78 sp=0xc0004d4e08 pc=0x7b64de gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000212e00) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 fp=0xc0004d4fc8 sp=0xc0004d4e78 pc=0x7b5a45 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x26 fp=0xc0004d4fe0 sp=0xc0004d4fc8 pc=0x7b0666 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d4fe8 sp=0xc0004d4fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 108 [select]: runtime.gopark(0xc0001b6fa8?, 0x2?, 0x60?, 0x4b?, 0xc0001b6f6c?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b6de8 sp=0xc0001b6dc8 pc=0x439d16 runtime.selectgo(0xc0001b6fa8, 0xc0001b6f68, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x7be fp=0xc0001b6f28 sp=0xc0001b6de8 pc=0x44a23e gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x1a5 fp=0xc0001b6fe0 sp=0xc0001b6f28 pc=0x9d3b65 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater pkg/sentry/kernel/timekeeper.go:224 +0xed goroutine 109 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000523ea0 sp=0xc000523e80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e018, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc000523ee8 sp=0xc000523ea0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000523f20 sp=0xc000523ee8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e000, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc000523fc0 sp=0xc000523f20 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000523fe0 sp=0xc000523fc0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000523fe8 sp=0xc000523fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 110 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000526ea0 sp=0xc000526e80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e0a8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc000526ee8 sp=0xc000526ea0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000526f20 sp=0xc000526ee8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e090, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc000526fc0 sp=0xc000526f20 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000526fe0 sp=0xc000526fc0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000526fe8 sp=0xc000526fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 111 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0005276a0 sp=0xc000527680 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e138, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc0005276e8 sp=0xc0005276a0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000527720 sp=0xc0005276e8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e120, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc0005277c0 sp=0xc000527720 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0005277e0 sp=0xc0005277c0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005277e8 sp=0xc0005277e0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 112 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000527ea0 sp=0xc000527e80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e1c8, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc000527ee8 sp=0xc000527ea0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000527f20 sp=0xc000527ee8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e1b0, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc000527fc0 sp=0xc000527f20 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000527fe0 sp=0xc000527fc0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000527fe8 sp=0xc000527fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 145 [select, 6 minutes]: runtime.gopark(0x6f74207776736f20?, 0x7373207478656f70?, 0x62?, 0x64?, 0x6974732062706269?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0006526a0 sp=0xc000652680 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e258, 0x1, 0x32?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc0006526e8 sp=0xc0006526a0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x6576617378207470?, 0x63?, 0x20?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000652720 sp=0xc0006526e8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e240, 0x6c630a7365676170?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc0006527c0 sp=0xc000652720 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006527e0 sp=0xc0006527c0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006527e8 sp=0xc0006527e0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 146 [select, 6 minutes]: runtime.gopark(0x70615f6474786520?, 0x6373742064696369?, 0x5f?, 0x6b?, 0x20696e7020716572?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000652ea0 sp=0xc000652e80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e2e8, 0x1, 0x6e?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc000652ee8 sp=0xc000652ea0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x67656c5f706d6320?, 0x61?, 0x63?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000652f20 sp=0xc000652ee8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e2d0, 0x6168732062776c63?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc000652fc0 sp=0xc000652f20 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000652fe0 sp=0xc000652fc0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000652fe8 sp=0xc000652fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 147 [select, 6 minutes]: runtime.gopark(0x72736d2063737420?, 0x65636d2065617020?, 0x20?, 0x63?, 0x746d207065732063?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0006536a0 sp=0xc000653680 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e378, 0x1, 0x65?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc0006536e8 sp=0xc0006536a0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x736e6f63206d6c20?, 0x74?, 0x61?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000653720 sp=0xc0006536e8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e360, 0x6d6c5f6668616c20?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc0006537c0 sp=0xc000653720 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0006537e0 sp=0xc0006537c0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0006537e8 sp=0xc0006537e0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 148 [select, 6 minutes]: runtime.gopark(0x68700a424b203231?, 0x69206c6163697379?, 0x64?, 0x9?, 0x3a0973676e696c62?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000653ea0 sp=0xc000653e80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e408, 0x1, 0x61?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc000653ee8 sp=0xc000653ea0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x6576656c20646975?, 0x6c?, 0x9?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc000653f20 sp=0xc000653ee8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e3f0, 0x7063737464722062?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc000653fc0 sp=0xc000653f20 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc000653fe0 sp=0xc000653fc0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000653fe8 sp=0xc000653fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 149 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bd6a0 sp=0xc0004bd680 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e498, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc0004bd6e8 sp=0xc0004bd6a0 pc=0xa30e65 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x45 fp=0xc0004bd720 sp=0xc0004bd6e8 pc=0xa30fe5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00063e480, 0x0?) pkg/tcpip/transport/tcp/dispatcher.go:287 +0xce fp=0xc0004bd7c0 sp=0xc0004bd720 pc=0xa542ee gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x2a fp=0xc0004bd7e0 sp=0xc0004bd7c0 pc=0xa54c4a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bd7e8 sp=0xc0004bd7e0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x14d goroutine 150 [select, 6 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bdea0 sp=0xc0004bde80 pc=0x439d16 gvisor.dev/gvisor/pkg/sync.Gopark(...) pkg/sync/runtime_unsafe.go:41 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00063e528, 0x1, 0x0?) pkg/sleep/sleep_unsafe.go:209 +0xe5 fp=0xc0004bdee8 sp=0xc0004bdea0 pc=0xa30e65 VM DIAGNOSIS: I0323 21:16:56.788320 303249 main.go:222] *************************** I0323 21:16:56.788386 303249 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0323 21:16:56.788426 303249 main.go:224] Version 0.0.0 I0323 21:16:56.788446 303249 main.go:225] GOOS: linux I0323 21:16:56.788495 303249 main.go:226] GOARCH: amd64 I0323 21:16:56.788534 303249 main.go:227] PID: 303249 I0323 21:16:56.788552 303249 main.go:228] UID: 0, GID: 0 I0323 21:16:56.788566 303249 main.go:229] Configuration: I0323 21:16:56.788579 303249 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0323 21:16:56.788592 303249 main.go:231] Platform: systrap I0323 21:16:56.788605 303249 main.go:232] FileAccess: shared I0323 21:16:56.788620 303249 main.go:233] Directfs: false I0323 21:16:56.788634 303249 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0323 21:16:56.788649 303249 main.go:236] Network: sandbox, logging: false I0323 21:16:56.788672 303249 main.go:237] Strace: false, max size: 1024, syscalls: I0323 21:16:56.788689 303249 main.go:238] IOURING: false I0323 21:16:56.788705 303249 main.go:239] Debug: true I0323 21:16:56.788721 303249 main.go:240] Systemd: false I0323 21:16:56.788737 303249 main.go:241] *************************** D0323 21:16:56.788788 303249 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0323 21:16:56.789997 303249 util.go:51] Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U0003d074'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U0003d074'], PID: %!d(MISSING) I0323 21:16:56.790054 303249 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0323 21:16:56.790062 303249 sandbox.go:1223] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0323 21:16:56.790069 303249 sandbox.go:571] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" W0323 21:16:56.790125 303249 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 249972: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 249972: connection refused W0323 21:16:56.790182 303249 main.go:267] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-0"]: exit status 128 I0323 21:16:56.788320 303249 main.go:222] *************************** I0323 21:16:56.788386 303249 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0323 21:16:56.788426 303249 main.go:224] Version 0.0.0 I0323 21:16:56.788446 303249 main.go:225] GOOS: linux I0323 21:16:56.788495 303249 main.go:226] GOARCH: amd64 I0323 21:16:56.788534 303249 main.go:227] PID: 303249 I0323 21:16:56.788552 303249 main.go:228] UID: 0, GID: 0 I0323 21:16:56.788566 303249 main.go:229] Configuration: I0323 21:16:56.788579 303249 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0323 21:16:56.788592 303249 main.go:231] Platform: systrap I0323 21:16:56.788605 303249 main.go:232] FileAccess: shared I0323 21:16:56.788620 303249 main.go:233] Directfs: false I0323 21:16:56.788634 303249 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0323 21:16:56.788649 303249 main.go:236] Network: sandbox, logging: false I0323 21:16:56.788672 303249 main.go:237] Strace: false, max size: 1024, syscalls: I0323 21:16:56.788689 303249 main.go:238] IOURING: false I0323 21:16:56.788705 303249 main.go:239] Debug: true I0323 21:16:56.788721 303249 main.go:240] Systemd: false I0323 21:16:56.788737 303249 main.go:241] *************************** D0323 21:16:56.788788 303249 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0323 21:16:56.789997 303249 util.go:51] Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U0003d074'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U0003d074'], PID: %!d(MISSING) I0323 21:16:56.790054 303249 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0323 21:16:56.790062 303249 sandbox.go:1223] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0323 21:16:56.790069 303249 sandbox.go:571] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" W0323 21:16:56.790125 303249 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 249972: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 249972: connection refused W0323 21:16:56.790182 303249 main.go:267] Failure to execute command, err: 1 [1947936.400737] exe[759674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55888c9df506 cs:33 sp:7f261dd0b8e8 ax:ffffffffff600000 si:7f261dd0be08 di:ffffffffff600000 [1947936.525519] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55888c9df506 cs:33 sp:7f261dd0b8e8 ax:ffffffffff600000 si:7f261dd0be08 di:ffffffffff600000 [1948477.187620] exe[764713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c76b2c2506 cs:33 sp:7f1ddd9028e8 ax:ffffffffff600000 si:7f1ddd902e08 di:ffffffffff600000 [1948478.092562] exe[779078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c76b2c2506 cs:33 sp:7f1ddd8e18e8 ax:ffffffffff600000 si:7f1ddd8e1e08 di:ffffffffff600000 [1948478.220934] exe[805538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948478.237936] exe[763633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c76b2c2506 cs:33 sp:7f1ddd9028e8 ax:ffffffffff600000 si:7f1ddd902e08 di:ffffffffff600000 [1948479.017933] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948479.181224] exe[120048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948479.944511] exe[32117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948480.841785] exe[952040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948481.741704] exe[764364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948481.856828] exe[764138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948482.632405] exe[764097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948482.709111] exe[800236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948483.531657] exe[818511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948483.610189] exe[800236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec7f58506 cs:33 sp:7faaf51ee8e8 ax:ffffffffff600000 si:7faaf51eee08 di:ffffffffff600000 [1948484.460001] exe[854710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948484.572180] exe[764106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948484.612405] exe[762987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948484.703941] exe[854710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948485.363249] exe[953321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948485.464514] exe[800787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948487.701432] warn_bad_vsyscall: 12 callbacks suppressed [1948487.701435] exe[953321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948487.784794] exe[818489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948487.850120] exe[818511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948487.883277] exe[818511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948488.002143] exe[128796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948488.091096] exe[800149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948488.200291] exe[129430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948488.289729] exe[764713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948488.375447] exe[764169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948489.151022] exe[764476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948492.901445] warn_bad_vsyscall: 8 callbacks suppressed [1948492.901449] exe[764713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948493.009986] exe[72791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948493.037651] exe[764147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948493.139978] exe[762976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.168433] exe[762976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.191475] exe[764354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.213251] exe[764354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.236675] exe[764354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.258092] exe[764354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948493.280132] exe[764354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948498.462501] warn_bad_vsyscall: 71 callbacks suppressed [1948498.462505] exe[762968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948498.562646] exe[764043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948498.590868] exe[764083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948499.366177] exe[801238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948499.452649] exe[763580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948499.563053] exe[863172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948500.247513] exe[75053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948500.334415] exe[120048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948501.146277] exe[764251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948501.273670] exe[764790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.478207] warn_bad_vsyscall: 13 callbacks suppressed [1948503.478211] exe[764378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.608016] exe[32909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.629952] exe[32909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.655003] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.677503] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.700662] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.722285] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.746289] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.768707] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948503.792173] exe[120200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948509.342740] warn_bad_vsyscall: 78 callbacks suppressed [1948509.342744] exe[132318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948509.429443] exe[764251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948509.571696] exe[133695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948510.251420] exe[34417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948510.352090] exe[34417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948510.462438] exe[764177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948511.229024] exe[764720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948511.344119] exe[764769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948512.109582] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948512.133742] exe[863825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.002257] warn_bad_vsyscall: 8 callbacks suppressed [1948515.002261] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.028629] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.050481] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.071638] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.093314] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.115728] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.139445] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.160782] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.183129] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948515.205515] exe[895630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948521.351686] warn_bad_vsyscall: 56 callbacks suppressed [1948521.351689] exe[764154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948521.561479] exe[32909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948521.667456] exe[32161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948521.872612] exe[77083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948521.992507] exe[764358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f088e8 ax:ffffffffff600000 si:7f1b99f08e08 di:ffffffffff600000 [1948522.119760] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948522.253810] exe[74992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948523.063815] exe[763676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948523.163836] exe[860523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948524.009494] exe[764361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948526.370569] warn_bad_vsyscall: 134 callbacks suppressed [1948526.370573] exe[119733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948526.413513] exe[119733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948526.484547] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948526.681429] exe[75148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948526.788156] exe[75148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948527.502943] exe[762968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948528.642456] exe[764058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948528.800169] exe[133695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948528.952276] exe[764053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948529.050475] exe[800246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948531.523430] warn_bad_vsyscall: 46 callbacks suppressed [1948531.523433] exe[780718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948531.550163] exe[764085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948531.964495] exe[819513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.138593] exe[32811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.142608] exe[35977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948532.286103] exe[133724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.332558] exe[131894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.491509] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948533.040702] exe[137145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948533.070120] exe[785952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948536.634402] warn_bad_vsyscall: 88 callbacks suppressed [1948536.634407] exe[32706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948537.225176] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.246862] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.270424] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.291978] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.313480] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.337860] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.362059] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.383425] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.407294] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948541.903173] warn_bad_vsyscall: 78 callbacks suppressed [1948541.903177] exe[763282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948541.946263] exe[762928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948542.042213] exe[764025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948542.086153] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948542.803137] exe[72805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948542.926192] exe[764072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.089147] exe[763203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.093094] exe[764546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948543.214800] exe[953321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.449075] exe[763690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948546.904150] warn_bad_vsyscall: 16 callbacks suppressed [1948546.904153] exe[763308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948547.034708] exe[72786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.167148] exe[800857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.225212] exe[764169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.337559] exe[763761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.381230] exe[763693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.514135] exe[32781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.675075] exe[763028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.797622] exe[764103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.830069] exe[764256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948552.060708] warn_bad_vsyscall: 10 callbacks suppressed [1948552.060711] exe[131894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.177036] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.219716] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.293925] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.331974] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.356195] exe[131521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.384909] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.428865] exe[131521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.454386] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.499166] exe[805538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948557.277425] warn_bad_vsyscall: 104 callbacks suppressed [1948557.277428] exe[766240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948557.498990] exe[763097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948558.230985] exe[33829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948558.453766] exe[764769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948559.158050] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.179658] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.203205] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.226202] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.247800] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.274153] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948562.296397] warn_bad_vsyscall: 199 callbacks suppressed [1948562.296401] exe[32703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948563.053386] exe[758823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948563.184436] exe[758194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1949480.149081] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949480.193854] exe[140589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949480.240316] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.477892] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.538386] exe[222783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.595577] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.653698] exe[142922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.708233] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.765781] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.814793] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949507.117119] warn_bad_vsyscall: 6 callbacks suppressed [1949507.117122] exe[251801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.204165] exe[2408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.295659] exe[810377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.324991] exe[92622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddec708e8 ax:ffffffffff600000 si:7fdddec70e08 di:ffffffffff600000 [1949507.676939] exe[981612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.762485] exe[247711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.850984] exe[135936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.934383] exe[992497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949508.016910] exe[66606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949508.081666] exe[251484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.178589] warn_bad_vsyscall: 98 callbacks suppressed [1949512.178592] exe[73140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.273115] exe[195508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.362936] exe[791076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.448254] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.469360] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.491520] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.513531] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.535027] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.559119] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.581626] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949517.849078] warn_bad_vsyscall: 187 callbacks suppressed [1949517.849081] exe[860216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949517.852497] exe[814285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.725264] exe[843343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949518.793948] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.817826] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.839103] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.862183] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.883676] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.905815] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.928967] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949522.863069] warn_bad_vsyscall: 151 callbacks suppressed [1949522.863072] exe[68505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949522.903427] exe[998903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949522.989833] exe[775423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949523.076351] exe[778589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949523.156878] exe[999082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.247661] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.268877] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.294577] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.315449] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.339794] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949527.929068] warn_bad_vsyscall: 178 callbacks suppressed [1949527.929071] exe[279338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.008402] exe[276795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.094441] exe[69284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.153763] exe[790569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.238000] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.323492] exe[814259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.348324] exe[790808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949528.419838] exe[92818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949528.481964] exe[775435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.552540] exe[816204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949841.163107] warn_bad_vsyscall: 97 callbacks suppressed [1949841.163110] exe[140576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.226340] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.227161] exe[141075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d70f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.297772] exe[140580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d70f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950100.781164] exe[379678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d52efa506 cs:33 sp:7f809c1d9f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950104.192181] exe[81314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950313.067187] exe[94384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950313.186456] exe[101358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950313.936596] exe[96832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950473.185427] exe[439203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a133e55506 cs:33 sp:7f2db16a9f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950506.179666] exe[434266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559318b23506 cs:33 sp:7f7837a6ef88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950590.041605] exe[414098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950590.096174] exe[356241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950590.156044] exe[355998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.753277] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.840920] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.916634] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.993999] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.070051] exe[361151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.146187] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.207229] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.077331] warn_bad_vsyscall: 16 callbacks suppressed [1950595.077334] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.140426] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.192314] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.247691] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.303582] exe[361151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.359061] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.415942] exe[355994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.495664] exe[429868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.556559] exe[429868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.613536] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950698.717149] warn_bad_vsyscall: 9 callbacks suppressed [1950698.717152] exe[103486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1950698.835083] exe[98752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1950698.872562] exe[98079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee70590f90 ax:7fee70591020 si:ffffffffff600000 di:55605e7322b3 [1950698.990928] exe[135164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1951369.114341] exe[573826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774036f506 cs:33 sp:7ecd9a9a0f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953255.660059] exe[842809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd73f6506 cs:33 sp:7f33963cef88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953290.027075] exe[551001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae898e8 ax:ffffffffff600000 si:7f539ae89e08 di:ffffffffff600000 [1953290.132912] exe[376219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae898e8 ax:ffffffffff600000 si:7f539ae89e08 di:ffffffffff600000 [1953290.413039] exe[506439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae268e8 ax:ffffffffff600000 si:7f539ae26e08 di:ffffffffff600000 [1953423.477674] exe[881006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563941c68506 cs:33 sp:7fed6c309f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953595.380027] exe[840174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.488594] exe[671854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.523284] exe[671854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.618178] exe[649589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953759.736543] exe[933642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b09980506 cs:33 sp:7f5ae896ff88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953787.183051] exe[939684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bef67fd506 cs:33 sp:7f7f5a46bf88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953842.288907] exe[892712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d7a91d378 cs:33 sp:7f6a55ffdf90 ax:7f6a55ffe020 si:ffffffffff600000 di:561d7a9e72b3 [1954241.233456] exe[634199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d040f90 ax:7fb15d041020 si:ffffffffff600000 di:5582d23cb2b3 [1954241.302606] exe[632676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d01ff90 ax:7fb15d020020 si:ffffffffff600000 di:5582d23cb2b3 [1954242.097890] exe[632526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d040f90 ax:7fb15d041020 si:ffffffffff600000 di:5582d23cb2b3 [1955338.793838] exe[173189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955338.848662] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955338.902381] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955345.604767] exe[825200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.677231] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.737971] exe[1788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.795191] exe[890207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.857749] exe[179708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.913373] exe[176216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.988978] exe[890192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955346.033204] exe[830209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955346.254275] exe[887839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955346.355586] exe[823633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955351.334755] warn_bad_vsyscall: 274 callbacks suppressed [1955351.334758] exe[826217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.436035] exe[824779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.516769] exe[824779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.610525] exe[823836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.668063] exe[902263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.734264] exe[823474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955351.734270] exe[159327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.823556] exe[823657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.878708] exe[902195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.929034] exe[1788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955356.339621] warn_bad_vsyscall: 243 callbacks suppressed [1955356.339625] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.366697] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.388984] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.411729] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.438475] exe[823623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.461534] exe[823623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.484957] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.506306] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.589222] exe[159317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955356.656709] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.008328] warn_bad_vsyscall: 130 callbacks suppressed [1955362.008332] exe[890188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955362.090284] exe[1791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.158543] exe[170732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.191472] exe[890192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955362.260679] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.325085] exe[887836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.398677] exe[179708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.477502] exe[825209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.482263] exe[902263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955362.564131] exe[823815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955367.231978] warn_bad_vsyscall: 78 callbacks suppressed [1955367.231982] exe[827898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955367.302070] exe[823850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.068537] exe[823577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.149607] exe[173189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.175675] exe[171731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.234655] exe[887839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.311036] exe[823553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.396670] exe[830209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.451033] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.504933] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955997.078557] warn_bad_vsyscall: 87 callbacks suppressed [1955997.078561] exe[143046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1955997.216049] exe[143046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1955997.345977] exe[142970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956012.907312] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.049821] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.167390] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.299034] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.430220] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.560090] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.682177] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.796456] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.918387] exe[221977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956014.040177] exe[221977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956017.929707] warn_bad_vsyscall: 44 callbacks suppressed [1956017.929710] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.060172] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.195382] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d760f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.314215] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.430455] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.431046] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.573622] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.673127] exe[143005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.789735] exe[143005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.895674] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.399503] warn_bad_vsyscall: 199 callbacks suppressed [1956023.399505] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.648903] exe[144656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.743203] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.870309] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.966517] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.996740] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.071163] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.220925] exe[184643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.277802] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.379327] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.451227] warn_bad_vsyscall: 77 callbacks suppressed [1956028.451231] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.550203] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.644290] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.739275] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.846308] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.940363] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.019076] exe[144656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.116295] exe[142954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.119339] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.234076] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.524360] warn_bad_vsyscall: 133 callbacks suppressed [1956033.524363] exe[185125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.601629] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.718430] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.825594] exe[145181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.928392] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.024148] exe[229232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.121267] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.223561] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.327940] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d780f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.441324] exe[120287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.586230] warn_bad_vsyscall: 87 callbacks suppressed [1956038.586234] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.696359] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.791117] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.793212] exe[225880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.894759] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.995917] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.019773] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.135229] exe[225880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.229591] exe[145180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.347305] exe[145180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.636936] warn_bad_vsyscall: 51 callbacks suppressed [1956043.636939] exe[145181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.672560] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d760f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.770990] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.774722] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.875189] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.947756] exe[143114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.036950] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.145302] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.241583] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.245037] exe[143114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956057.329758] warn_bad_vsyscall: 20 callbacks suppressed [1956057.329761] exe[294237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee988e8 ax:ffffffffff600000 si:7fdd2ee98e08 di:ffffffffff600000 [1956057.406059] exe[159219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee568e8 ax:ffffffffff600000 si:7fdd2ee56e08 di:ffffffffff600000 [1956057.466304] exe[827279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee988e8 ax:ffffffffff600000 si:7fdd2ee98e08 di:ffffffffff600000 [1956057.467139] exe[1791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee778e8 ax:ffffffffff600000 si:7fdd2ee77e08 di:ffffffffff600000 [1958277.053943] exe[666336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.098030] exe[667447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.156946] exe[663688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.184733] exe[666312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958285.673798] exe[667457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.715159] exe[690733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.757497] exe[690113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.799322] exe[663685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958628.782468] exe[639063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.856839] exe[646724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.932011] exe[639280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.973333] exe[639377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8911f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1960026.400913] exe[667443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1960026.472846] exe[703076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1960026.536697] exe[702604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1962637.996494] exe[278373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d78a8e8 ax:ffffffffff600000 si:7fb93d78ae08 di:ffffffffff600000 [1962638.041234] exe[278886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d78a8e8 ax:ffffffffff600000 si:7fb93d78ae08 di:ffffffffff600000 [1962638.098274] exe[274834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d7698e8 ax:ffffffffff600000 si:7fb93d769e08 di:ffffffffff600000 [1962638.319903] exe[275174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.373756] exe[275174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.444269] exe[278886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.499630] exe[278961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.556330] exe[274510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.613640] exe[274635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.676582] exe[274718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1963016.387357] warn_bad_vsyscall: 2 callbacks suppressed [1963016.387360] exe[176098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.765167] exe[222736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.824369] exe[277253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.899016] exe[176169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.975677] exe[277253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.052029] exe[176169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.117218] exe[176099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.177552] exe[176099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.244531] exe[292138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.306613] exe[176162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963042.915010] warn_bad_vsyscall: 16 callbacks suppressed [1963042.915014] exe[190870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d4c35f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963042.979411] exe[202588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d4c35f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963043.032481] exe[206127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d47fef88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963062.914232] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963062.989838] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.060177] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.085280] exe[224861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.149169] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.234855] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.260124] exe[191517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.324348] exe[224861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.347373] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.436262] exe[191456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963067.932160] warn_bad_vsyscall: 184 callbacks suppressed [1963067.932164] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963067.992851] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.044634] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6e89f90 ax:7f24f6e8a020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.094411] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.114609] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.136811] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.157197] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.178221] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.199849] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.221050] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.016197] warn_bad_vsyscall: 328 callbacks suppressed [1963073.016200] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.086469] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.143804] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.200291] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.258031] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.323628] exe[198288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.346270] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.394650] exe[198288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.481398] exe[193663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.557167] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1964258.625647] warn_bad_vsyscall: 131 callbacks suppressed [1964258.625649] exe[490243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f943dc506 cs:33 sp:7f70a912f8e8 ax:ffffffffff600000 si:7f70a912fe08 di:ffffffffff600000 [1964426.646434] exe[158113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964426.720076] exe[158250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964426.827351] exe[158295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964642.963352] exe[274456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964643.036709] exe[274623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964643.158374] exe[280122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964737.985174] exe[278993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.038299] exe[274749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.088122] exe[278999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.139143] exe[598755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.196542] exe[280121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.252417] exe[274685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.304082] exe[274633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.382169] exe[275156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.382889] exe[274613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.453084] exe[274562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.000805] warn_bad_vsyscall: 137 callbacks suppressed [1964743.000808] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.087819] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.116806] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48f908e8 ax:ffffffffff600000 si:7f7f48f90e08 di:ffffffffff600000 [1964743.190119] exe[280121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.251097] exe[280224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.311374] exe[280224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.342352] exe[307384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.397205] exe[278390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.475620] exe[284146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.551475] exe[285840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.087291] warn_bad_vsyscall: 218 callbacks suppressed [1964748.087294] exe[597720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48f6f8e8 ax:ffffffffff600000 si:7f7f48f6fe08 di:ffffffffff600000 [1964748.219389] exe[274822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.295369] exe[276442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.394745] exe[274439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.396243] exe[274455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964748.518045] exe[274456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.605445] exe[274515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.703152] exe[274618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.820349] exe[278373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.949910] exe[274485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.093314] warn_bad_vsyscall: 164 callbacks suppressed [1964753.093318] exe[274485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.159969] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.184576] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.206307] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.228090] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.248764] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.270766] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.293900] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.315606] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.337957] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1965105.790533] warn_bad_vsyscall: 46 callbacks suppressed [1965105.790538] exe[651312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56013a961506 cs:33 sp:7fdc826a38e8 ax:ffffffffff600000 si:7fdc826a3e08 di:ffffffffff600000 [1965353.187589] exe[710755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f105ca6506 cs:33 sp:7f9c037d78e8 ax:ffffffffff600000 si:7f9c037d7e08 di:ffffffffff600000 [1965617.256369] exe[702122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d704e18506 cs:33 sp:7fbb378c68e8 ax:ffffffffff600000 si:7fbb378c6e08 di:ffffffffff600000 [1965740.904476] exe[741714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628dcad5506 cs:33 sp:7fc116f098e8 ax:ffffffffff600000 si:7fc116f09e08 di:ffffffffff600000 [1965753.285603] exe[768704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf8b63f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965754.703088] exe[789017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ac7491101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965863.468027] exe[810450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55847f021101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965934.007376] exe[822371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639df523506 cs:33 sp:7fa5891028e8 ax:ffffffffff600000 si:7fa589102e08 di:ffffffffff600000 [1965969.339871] exe[829165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c3f90e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965996.083892] exe[833727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6e32ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1966050.101288] exe[812092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e74ba6506 cs:33 sp:7f6a339438e8 ax:ffffffffff600000 si:7f6a33943e08 di:ffffffffff600000 [1966061.823883] exe[716221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.868344] exe[716072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.890772] exe[716051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.933013] exe[716222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966067.025568] exe[716308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.071188] exe[718592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.130574] exe[716315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.190424] exe[719103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.269302] exe[716107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.328453] exe[736274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.414931] exe[718592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.462345] exe[801122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.510713] exe[801130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.572011] exe[716329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966072.484480] warn_bad_vsyscall: 206 callbacks suppressed [1966072.484484] exe[716333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966072.543674] exe[809308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.326624] exe[716333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966073.379105] exe[809192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.451185] exe[800943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.451224] exe[717013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966073.515593] exe[716348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.540169] exe[716072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0fe8e8 ax:ffffffffff600000 si:7f891d0fee08 di:ffffffffff600000 [1966073.585297] exe[717013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.639646] exe[747012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966077.636273] warn_bad_vsyscall: 82 callbacks suppressed [1966077.636276] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966077.667405] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0bc8e8 ax:ffffffffff600000 si:7f891d0bce08 di:ffffffffff600000 [1966078.538496] exe[716227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966078.565490] exe[801122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0dd8e8 ax:ffffffffff600000 si:7f891d0dde08 di:ffffffffff600000 [1966079.366552] exe[716363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.454698] exe[763505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.486419] exe[800970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.560694] exe[800980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.583675] exe[716241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.604383] exe[716241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.655633] warn_bad_vsyscall: 172 callbacks suppressed [1966082.655636] exe[800973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.755292] exe[747012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.831377] exe[719118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.901205] exe[718573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.969962] exe[719118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.020059] exe[800950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.098468] exe[716141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.133168] exe[737533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.202950] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.359306] exe[716158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966140.416970] warn_bad_vsyscall: 98 callbacks suppressed [1966140.416973] exe[717084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f9cf8e8 ax:ffffffffff600000 si:7f4e2f9cfe08 di:ffffffffff600000 [1966140.496734] exe[800954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f98d8e8 ax:ffffffffff600000 si:7f4e2f98de08 di:ffffffffff600000 [1966140.574303] exe[717018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f98d8e8 ax:ffffffffff600000 si:7f4e2f98de08 di:ffffffffff600000 [1966193.811850] exe[812774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564430f99506 cs:33 sp:7faa9805b8e8 ax:ffffffffff600000 si:7faa9805be08 di:ffffffffff600000 [1966636.503438] exe[929950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6e32dd506 cs:33 sp:7eeb129a98e8 ax:ffffffffff600000 si:7eeb129a9e08 di:ffffffffff600000 [1967149.850912] exe[910870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967149.903380] exe[910839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967149.954404] exe[910870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967154.955076] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.019923] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.088538] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.153199] exe[910858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.210940] exe[910858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.268171] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.323978] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.390941] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.440747] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.497698] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967224.854317] warn_bad_vsyscall: 5 callbacks suppressed [1967224.854321] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.902492] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.948562] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.997480] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.036351] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.077508] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.126299] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.179373] exe[910875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.202944] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.241190] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967229.904253] warn_bad_vsyscall: 268 callbacks suppressed [1967229.904256] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967229.979039] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.000423] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.056427] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.117185] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.169550] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.190853] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.211580] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.232383] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.261019] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967234.984969] warn_bad_vsyscall: 113 callbacks suppressed [1967234.984973] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.061879] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.123383] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.210275] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.341580] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.450767] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.531649] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.641006] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.661454] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.686931] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967239.997989] warn_bad_vsyscall: 185 callbacks suppressed [1967239.997992] exe[955101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.032945] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.116445] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.198832] exe[955101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.323165] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.345851] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.366973] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.387582] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.408898] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.436409] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.019117] warn_bad_vsyscall: 121 callbacks suppressed [1967245.019120] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.053196] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.128731] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.174839] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.309993] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.483382] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.618823] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.750459] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.884299] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967246.028937] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967250.772128] warn_bad_vsyscall: 5 callbacks suppressed [1967250.772131] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967250.905582] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.018214] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.148226] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.252114] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.363881] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.489954] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.619651] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.709365] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.786671] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967255.804811] warn_bad_vsyscall: 108 callbacks suppressed [1967255.804814] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967255.806771] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.298771] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.489900] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.575347] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.664498] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.736881] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.756946] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.777471] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.799982] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967260.838242] warn_bad_vsyscall: 271 callbacks suppressed [1967260.838245] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967260.933637] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.043580] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.167645] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.231352] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.232078] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.326989] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.402035] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.469789] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.553293] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967265.876190] warn_bad_vsyscall: 126 callbacks suppressed [1967265.876194] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967265.952712] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.079195] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.184317] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.304298] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.402523] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.554878] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.680347] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.767802] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.841712] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967270.917192] warn_bad_vsyscall: 213 callbacks suppressed [1967270.917196] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967270.947369] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.046191] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.167265] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.188856] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.213929] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.235947] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.259281] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.282365] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.307227] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967275.997059] warn_bad_vsyscall: 208 callbacks suppressed [1967275.997062] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.047585] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.175352] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.246021] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.279748] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.449218] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.529335] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.622742] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.723030] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.801793] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.009879] warn_bad_vsyscall: 146 callbacks suppressed [1967281.009882] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.075016] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.177037] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.312859] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.394780] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.479114] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.567166] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.655674] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.725837] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.772178] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967782.189483] warn_bad_vsyscall: 55 callbacks suppressed [1967782.189486] exe[801022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.284040] exe[716307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.390743] exe[717063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.427040] exe[716095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0fe8e8 ax:ffffffffff600000 si:7f891d0fee08 di:ffffffffff600000 [1968652.631074] exe[219816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbbce8c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969075.178479] exe[296430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ab9fd101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969421.318988] exe[339258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c7b4a0101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969563.532233] exe[374574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613799d1101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969615.103609] exe[376258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609fbc84506 cs:33 sp:7f23952ec8e8 ax:ffffffffff600000 si:7f23952ece08 di:ffffffffff600000 [1970144.072542] exe[439400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970144.169102] exe[236930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970144.196732] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4408e8 ax:ffffffffff600000 si:7f5b2f440e08 di:ffffffffff600000 [1970144.282802] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970150.536381] exe[310852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.635293] exe[420893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.764940] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.878926] exe[420744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.987747] exe[421609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.061262] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.135780] exe[421937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.274864] exe[340516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.364744] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.474367] exe[439541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970175.670778] warn_bad_vsyscall: 5 callbacks suppressed [1970175.670782] exe[420790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970175.735565] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.531297] exe[439540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.553599] exe[439639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.636519] exe[439521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.689236] exe[440148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.723247] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.805201] exe[421937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.836239] exe[421615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970177.577190] exe[440148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.035929] warn_bad_vsyscall: 9 callbacks suppressed [1970181.035932] exe[440593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.115775] exe[440224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.920983] exe[440275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.000040] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.044514] exe[440138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.166638] exe[439400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.255072] exe[439354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.330397] exe[440131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.403298] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.445752] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970186.308899] warn_bad_vsyscall: 146 callbacks suppressed [1970186.308903] exe[241577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970186.373055] exe[242017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970186.373671] exe[420872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970187.225830] exe[421615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.293065] exe[420872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.362475] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.554048] exe[264656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.613725] exe[439542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.671998] exe[420902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.752249] exe[439855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.073037] warn_bad_vsyscall: 60 callbacks suppressed [1970192.073040] exe[241981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.148306] exe[443636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.950509] exe[420940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.987185] exe[426987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970193.050559] exe[420889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970193.864519] exe[439507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970193.947974] exe[440658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.054499] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.120212] exe[420940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.244694] exe[380868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970197.181676] warn_bad_vsyscall: 7 callbacks suppressed [1970197.181679] exe[439641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.270191] exe[380868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.351333] exe[421651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970197.351663] exe[426987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.442662] exe[234260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.281795] exe[400701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.339623] exe[380337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.366728] exe[395516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970199.122823] exe[440658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970199.215420] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.757363] warn_bad_vsyscall: 61 callbacks suppressed [1970202.757366] exe[432773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.842019] exe[380538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.842119] exe[236540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970203.649962] exe[380314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.709297] exe[236540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.791406] exe[376094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.857458] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.878388] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.901058] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.922781] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970207.770577] warn_bad_vsyscall: 156 callbacks suppressed [1970207.770580] exe[440145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.771559] exe[439507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970207.846155] exe[380861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.896436] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.965854] exe[383666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.992458] exe[380374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.066988] exe[380348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.275643] exe[241249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.337793] exe[439531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.393939] exe[439463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970213.050621] warn_bad_vsyscall: 99 callbacks suppressed [1970213.050625] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970213.123063] exe[440281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970213.955953] exe[420868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970214.025624] exe[439502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325fdd8e8 ax:ffffffffff600000 si:7fa325fdde08 di:ffffffffff600000 [1970214.815800] exe[241577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970214.896434] exe[440275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970214.968528] exe[420902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.036104] exe[253198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.056485] exe[429453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.077730] exe[443636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970218.725043] warn_bad_vsyscall: 76 callbacks suppressed [1970218.725047] exe[440141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970218.804173] exe[439855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.563854] exe[439339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.648096] exe[440224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.711827] exe[421623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.785028] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.852516] exe[340507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.928395] exe[440129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970220.025862] exe[439337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970220.833095] exe[439337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970249.090626] warn_bad_vsyscall: 18 callbacks suppressed [1970249.090629] exe[410587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582aa232378 cs:33 sp:7f3cca621f90 ax:7f3cca622020 si:ffffffffff600000 di:5582aa2fc2b3 [1970293.747603] exe[450753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635dbdd2378 cs:33 sp:7f44b49dbf90 ax:7f44b49dc020 si:ffffffffff600000 di:5635dbe9c2b3 [1970293.922588] exe[361253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561379971378 cs:33 sp:7faf2ae92f90 ax:7faf2ae93020 si:ffffffffff600000 di:561379a3b2b3 [1970297.348217] exe[455489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0dd21e378 cs:33 sp:7ed78c1def90 ax:7ed78c1df020 si:ffffffffff600000 di:55e0dd2e82b3 [1970534.559113] exe[477251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ba4b39506 cs:33 sp:7f4e6f3978e8 ax:ffffffffff600000 si:7f4e6f397e08 di:ffffffffff600000 [1970655.300628] exe[340605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970655.377818] exe[342572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.400455] exe[342572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.421938] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.445607] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.468270] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.490984] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.515221] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.539996] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.561534] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970824.330318] warn_bad_vsyscall: 57 callbacks suppressed [1970824.330321] exe[531772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563847b28378 cs:33 sp:7f3b061c5f90 ax:7f3b061c6020 si:ffffffffff600000 di:563847bf22b3 [1971736.970753] exe[411953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50ee8e8 ax:ffffffffff600000 si:7fdbf50eee08 di:ffffffffff600000 [1971737.137433] exe[592175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50ee8e8 ax:ffffffffff600000 si:7fdbf50eee08 di:ffffffffff600000 [1971737.168110] exe[357334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50cd8e8 ax:ffffffffff600000 si:7fdbf50cde08 di:ffffffffff600000 [1971737.475498] exe[531343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50cd8e8 ax:ffffffffff600000 si:7fdbf50cde08 di:ffffffffff600000 [1972243.447820] exe[573417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.515933] exe[573450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.591264] exe[548272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.719638] exe[653543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972448.671193] exe[787132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.734755] exe[787151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.812304] exe[787169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.904456] exe[787195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972479.451551] exe[797900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.549874] exe[797932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.650143] exe[797975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.743945] exe[798021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972858.424047] exe[861880] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972858.896523] exe[921495] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972859.327121] exe[827092] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972859.730586] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972860.218672] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972860.667320] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972861.088378] exe[820897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1973546.813149] exe[63281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973546.948464] exe[573324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973547.045579] exe[105367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973547.134944] exe[63281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973791.894798] exe[94237] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.204298] exe[94050] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.516268] exe[99370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.827928] exe[99370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973824.134695] exe[153162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.204637] exe[69483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.293794] exe[91177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.461911] exe[91713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973920.067173] exe[172583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.335542] exe[172578] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.647020] exe[172494] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.950110] exe[174529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.272482] exe[179109] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.558511] exe[175627] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.885911] exe[178063] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1974040.144490] exe[181516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.260787] exe[932366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.355617] exe[182847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.441083] exe[881638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974646.975585] exe[287966] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.263632] exe[290684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.517902] exe[278829] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.752293] exe[287966] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974750.948905] exe[923526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f24029506 cs:33 sp:7f9b9710e8e8 ax:ffffffffff600000 si:7f9b9710ee08 di:ffffffffff600000 [1974810.429517] exe[272123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cc50da506 cs:33 sp:7fd29207e8e8 ax:ffffffffff600000 si:7fd29207ee08 di:ffffffffff600000 [1974864.922388] exe[292771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbf222e506 cs:33 sp:7f4fe19378e8 ax:ffffffffff600000 si:7f4fe1937e08 di:ffffffffff600000 [1974985.237943] exe[161767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.325876] exe[179641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.405020] exe[213527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.474265] exe[60881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975334.647112] exe[363004] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975335.063318] exe[354566] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975335.489901] exe[354639] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975336.118347] exe[362944] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975620.168264] exe[61277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.264019] exe[386013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.354489] exe[386013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975620.362381] exe[68150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.397024] exe[187633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56371aec0506 cs:33 sp:7f98773348e8 ax:ffffffffff600000 si:7f9877334e08 di:ffffffffff600000 [1975620.455858] exe[68150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975620.461668] exe[169572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.481231] exe[188861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620630cd506 cs:33 sp:7f024cd148e8 ax:ffffffffff600000 si:7f024cd14e08 di:ffffffffff600000 [1975620.484853] exe[386051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56371aec0506 cs:33 sp:7f98773348e8 ax:ffffffffff600000 si:7f9877334e08 di:ffffffffff600000 [1975620.572507] exe[937630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975798.291242] warn_bad_vsyscall: 3 callbacks suppressed [1975798.291246] exe[753786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564405277506 cs:33 sp:7f9d6e7d28e8 ax:ffffffffff600000 si:7f9d6e7d2e08 di:ffffffffff600000 [1975857.357407] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975857.649477] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975857.960154] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975858.239235] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975999.899272] exe[315263] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1976237.821298] exe[453195] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1976315.748501] exe[380206] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1976564.849204] exe[494404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b23b5c506 cs:33 sp:7fcb776478e8 ax:ffffffffff600000 si:7fcb77647e08 di:ffffffffff600000 [1976617.634459] exe[492537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e81e92e506 cs:33 sp:7ff403bfe8e8 ax:ffffffffff600000 si:7ff403bfee08 di:ffffffffff600000 [1976652.099977] exe[532323] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1976944.019857] exe[550618] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1976950.131134] exe[475547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1979309.502084] exe[864229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6435c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979327.393341] exe[862526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6435c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979334.509177] exe[860502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55961dd1d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979334.896711] exe[859712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202aecc101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979384.255084] exe[870568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a690120101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979385.187131] exe[870644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a690120101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979499.640905] exe[882514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979500.150943] exe[882559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979959.597735] exe[930179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632fd04d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979960.363007] exe[927928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632fd04d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980043.708849] exe[842990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202aecc101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980050.470402] exe[943441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559195627101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980098.895553] exe[947191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980119.411698] exe[952939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b52cb13101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980152.435814] exe[957691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f16406101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980153.035937] exe[955975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d77ce5101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980207.569739] exe[969455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf0d406101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980236.364656] exe[975829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565385931101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980236.526206] exe[971720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d45bb5e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980333.748536] exe[994186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf0061b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980334.920646] exe[993890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649d18fa101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980347.750148] exe[996981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ccc3d1101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980461.698289] exe[5618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557376295101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980461.853450] exe[5535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557376295101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980523.629348] exe[28369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b488c4b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980536.116393] exe[33866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1d6e1e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980638.039889] exe[52087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55713e32e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980638.361299] exe[52139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c739fd8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980690.954002] exe[13122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.016565] exe[13850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.074293] exe[11499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.101750] exe[13832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6acf90 ax:7fcabb6ad020 si:ffffffffff600000 di:5645dbe0e2b3 [1980720.161447] exe[66688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e28151101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980916.174797] exe[77148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699558d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1981357.976157] exe[140335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563694f8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1981357.977768] exe[141828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560872d82101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1981403.322306] exe[162210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673ef9101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982225.684853] exe[279856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e53514c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982226.174739] exe[263048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e53514c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982456.874716] exe[330533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567557eb101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982732.941377] exe[353099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559950b42101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982746.332425] exe[369850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb231f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982746.470252] exe[371567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567557eb101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982814.422798] exe[379135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556598ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982815.216323] exe[380269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556598ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1986706.354856] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.425378] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.504740] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.535227] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.380472] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.465996] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.542571] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.646530] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.729602] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.799223] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.901646] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.978439] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986730.028504] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986730.109615] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.422238] warn_bad_vsyscall: 119 callbacks suppressed [1986734.422241] exe[471542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.452189] exe[595363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986734.532174] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.660162] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75dd8e8 ax:ffffffffff600000 si:7fc1f75dde08 di:ffffffffff600000 [1986734.709248] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.742802] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.791337] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.886828] exe[471542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.888029] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986734.993417] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.443700] warn_bad_vsyscall: 171 callbacks suppressed [1986739.443703] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.535814] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.603207] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.672150] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.696425] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.813368] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.962711] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986740.097357] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986740.195826] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986740.288299] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.471074] warn_bad_vsyscall: 154 callbacks suppressed [1986744.471077] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986744.549031] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.652110] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.739379] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.765932] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986744.844917] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.923996] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.992818] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986745.057071] exe[471868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986745.112222] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.491366] warn_bad_vsyscall: 110 callbacks suppressed [1986749.491369] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.645527] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.705870] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.758958] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.812898] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.914360] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.972467] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.231874] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.327593] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.411243] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.576860] warn_bad_vsyscall: 64 callbacks suppressed [1986754.576864] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.639265] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.664219] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.735484] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986754.827578] exe[475677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.915484] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.974396] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986755.001971] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986755.072868] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986755.152312] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986759.585394] warn_bad_vsyscall: 166 callbacks suppressed [1986759.585396] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.641784] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.662907] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.684410] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.705504] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.725870] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.748380] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.770435] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.792261] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.815330] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986764.610807] warn_bad_vsyscall: 202 callbacks suppressed [1986764.610810] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.665405] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.733012] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.793246] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.881225] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.987212] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.043551] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.120213] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.198109] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.277226] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.673138] warn_bad_vsyscall: 182 callbacks suppressed [1986769.673141] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.763251] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.858360] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.881696] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.903673] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.923974] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.950971] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.974095] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.997534] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986770.020533] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.724945] warn_bad_vsyscall: 496 callbacks suppressed [1986774.724949] exe[471868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.805431] exe[595210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.832840] exe[595210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.887429] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.937334] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.989529] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.052978] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.054777] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986775.124768] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.205593] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1987209.263141] warn_bad_vsyscall: 70 callbacks suppressed [1987209.263144] exe[852502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.353222] exe[765781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.388737] exe[765934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.549930] exe[776840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792eb9bf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987675.543277] exe[869542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f81744bc8e8 ax:ffffffffff600000 si:7f81744bce08 di:ffffffffff600000 [1987675.606876] exe[864938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f817449b8e8 ax:ffffffffff600000 si:7f817449be08 di:ffffffffff600000 [1987675.661550] exe[831434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f817449b8e8 ax:ffffffffff600000 si:7f817449be08 di:ffffffffff600000 [1987936.108935] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987936.320472] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987936.507272] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987949.348902] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987949.693223] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.005140] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.379212] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.715736] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.073329] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.384869] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.661972] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987952.084179] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987952.351337] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987954.464992] warn_bad_vsyscall: 12 callbacks suppressed [1987954.464995] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.508447] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.671415] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.816104] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.114796] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.251103] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.420933] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.756999] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.815666] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.955257] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.474677] warn_bad_vsyscall: 22 callbacks suppressed [1987959.474680] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.608495] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.768203] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.021274] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.184917] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.347105] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.560261] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.677501] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.820346] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.963569] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.592720] warn_bad_vsyscall: 28 callbacks suppressed [1987964.592723] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.718043] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.897061] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.188743] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.346012] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.563248] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.820711] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.935700] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987966.084427] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987966.315772] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.672640] warn_bad_vsyscall: 23 callbacks suppressed [1987969.672643] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.759271] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.880978] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.916283] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.952011] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.985367] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.018977] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.058018] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.089766] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.124607] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.725630] warn_bad_vsyscall: 87 callbacks suppressed [1987974.725633] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.766083] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.964975] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.088849] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.129928] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.243543] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.366761] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.591328] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.709502] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.881902] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987979.808773] warn_bad_vsyscall: 23 callbacks suppressed [1987979.808775] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.025937] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.271890] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.462779] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.621662] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.781972] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.116161] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.167078] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.368932] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.550556] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987984.824173] warn_bad_vsyscall: 18 callbacks suppressed [1987984.824177] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987984.974771] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.175958] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.362861] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.508908] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.516698] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.796704] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.963471] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987986.099803] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987986.279517] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.169093] warn_bad_vsyscall: 25 callbacks suppressed [1987990.169096] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.408254] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.466549] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.696228] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.889779] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.931657] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.049383] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.236318] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.451151] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.609588] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.284191] warn_bad_vsyscall: 24 callbacks suppressed [1987995.284194] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.511775] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.761386] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.915082] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.121288] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.275810] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.393604] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.538568] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.845399] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.997912] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.302208] warn_bad_vsyscall: 33 callbacks suppressed [1988000.302211] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.348101] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.389369] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.429092] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.466659] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.507914] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.546532] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.585848] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.624766] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.664865] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.443108] warn_bad_vsyscall: 67 callbacks suppressed [1988005.443112] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.562862] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.606989] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.811636] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.003870] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.133443] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.299524] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.571109] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.615234] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.754605] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.490165] warn_bad_vsyscall: 12 callbacks suppressed [1988010.490168] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.703963] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.906588] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.120734] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.381265] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.572324] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.771073] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.951991] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988012.190785] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988012.394096] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988015.601224] warn_bad_vsyscall: 5 callbacks suppressed [1988015.601227] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988015.847207] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.118025] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.402811] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.650411] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.884400] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.128246] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.392788] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.608149] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.820871] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.693891] warn_bad_vsyscall: 16 callbacks suppressed [1988020.693894] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.740403] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.784807] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.825093] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.865040] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.901923] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.941138] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.977860] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988021.015558] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988021.054401] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.706835] warn_bad_vsyscall: 72 callbacks suppressed [1988025.706839] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.745218] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.778832] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.811083] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.846655] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.878581] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.911515] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.944610] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.982768] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988026.020666] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988030.812401] warn_bad_vsyscall: 33 callbacks suppressed [1988030.812403] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.016050] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.236982] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.416688] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.984566] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.178624] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.344771] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.552017] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.794997] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.838383] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.831370] warn_bad_vsyscall: 74 callbacks suppressed [1988035.831373] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.877965] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.922085] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.962552] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.003749] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.046780] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.089919] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.129712] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.170519] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.208863] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.840192] warn_bad_vsyscall: 130 callbacks suppressed [1988040.840195] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.887109] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.932484] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.972645] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.013466] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.052532] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.091096] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.133108] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.175738] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.219060] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988045.957192] warn_bad_vsyscall: 162 callbacks suppressed [1988045.957195] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.139458] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.341008] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.478257] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.733383] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.901808] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.946142] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.083801] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.249940] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.398709] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.043601] warn_bad_vsyscall: 27 callbacks suppressed [1988051.043604] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.095007] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.218002] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.378266] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.507176] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.544988] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.684255] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.903271] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988052.344816] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988052.462609] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.052180] warn_bad_vsyscall: 22 callbacks suppressed [1988056.052182] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.260224] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.406801] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.540596] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.739838] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.994628] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.124891] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.720180] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.920815] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988058.063842] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.399766] warn_bad_vsyscall: 11 callbacks suppressed [1988061.399768] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.593413] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.762014] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.766302] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.982904] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.313279] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.374803] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.543397] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.594200] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.830194] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.458433] warn_bad_vsyscall: 23 callbacks suppressed [1988066.458436] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.741663] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.924701] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.974580] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988067.114858] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.110095] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.315468] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.481089] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988069.571695] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988069.753585] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.461270] warn_bad_vsyscall: 12 callbacks suppressed [1988071.461273] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.687390] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.746250] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.911783] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.190129] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.359020] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.561379] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.913714] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988073.203453] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988073.370475] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988076.785647] warn_bad_vsyscall: 75 callbacks suppressed [1988076.785651] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.010925] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.208897] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.526707] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.668272] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.794700] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.978097] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988078.855841] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988079.480756] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988079.649581] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988081.842182] warn_bad_vsyscall: 6 callbacks suppressed [1988081.842185] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988081.994947] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.038331] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.327309] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.576877] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.581082] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.712255] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.906492] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988083.089203] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988083.240670] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.084383] warn_bad_vsyscall: 51 callbacks suppressed [1988087.084386] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.347906] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.395900] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.550221] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.591160] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.631716] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.667874] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.707496] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.745767] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.784841] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.211409] warn_bad_vsyscall: 34 callbacks suppressed [1988092.211412] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.436030] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.643553] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988102.070775] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988102.647807] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988103.200993] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988103.701834] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988104.243813] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988104.819603] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988105.322624] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988105.890862] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988106.430162] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988106.890684] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988107.354664] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988107.863222] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988108.307109] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988108.750145] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.114307] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.505564] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.822775] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.173547] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.474118] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.731465] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988112.523163] warn_bad_vsyscall: 7 callbacks suppressed [1988112.523166] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988112.851444] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.067490] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.073233] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.232058] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.239031] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.404038] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.526850] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.634860] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.795810] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.639656] warn_bad_vsyscall: 55 callbacks suppressed [1988117.639659] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.685426] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.833565] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.872609] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.039454] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.184657] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.222431] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.259234] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.296466] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.339675] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.655907] warn_bad_vsyscall: 107 callbacks suppressed [1988122.655909] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.707968] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.916138] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.953456] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.989325] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.029165] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.068982] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.109550] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.147658] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.189237] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988127.806043] warn_bad_vsyscall: 81 callbacks suppressed [1988127.806046] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.010561] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.045269] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.080907] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.116113] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.152738] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.190653] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.226895] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.268338] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.299867] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988132.981868] warn_bad_vsyscall: 50 callbacks suppressed [1988132.981872] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.032467] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.205016] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.388490] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.547510] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.660919] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.882164] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.011222] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.182498] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.371637] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988140.228532] warn_bad_vsyscall: 7 callbacks suppressed [1988140.228535] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988142.819840] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.027421] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.032839] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.204574] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.386669] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.542764] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.667206] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.672917] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.890459] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.243877] warn_bad_vsyscall: 8 callbacks suppressed [1988145.243880] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.445686] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.574659] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.744785] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.060803] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.190269] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.243399] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.480795] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.650150] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.777021] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.381088] warn_bad_vsyscall: 80 callbacks suppressed [1988150.381091] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.522472] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.565916] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.684080] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.982346] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.126648] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.335664] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.606060] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.769432] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.960496] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.535384] warn_bad_vsyscall: 52 callbacks suppressed [1988155.535387] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.665751] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.821437] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.959366] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.054090] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.091369] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.296057] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.434995] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.554234] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.920334] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.684735] warn_bad_vsyscall: 50 callbacks suppressed [1988160.684738] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.826761] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.970046] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.256668] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.412983] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.599064] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.811933] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.006831] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.055465] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.167365] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.762527] warn_bad_vsyscall: 75 callbacks suppressed [1988165.762530] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.889906] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.926317] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.108859] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.263550] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.435895] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.476394] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.573746] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.604158] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.638405] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.005274] warn_bad_vsyscall: 110 callbacks suppressed [1988171.005277] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.424861] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.480095] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.640707] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.859365] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.987398] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.196565] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.387796] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.636737] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.799736] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.090293] warn_bad_vsyscall: 23 callbacks suppressed [1988176.090296] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.564187] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.765201] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.800835] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.834389] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.870684] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.906511] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.997285] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988177.033325] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988177.070441] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988427.709416] warn_bad_vsyscall: 39 callbacks suppressed [1988427.709420] exe[118832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7894f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.762066] exe[118832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7873f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.812464] exe[118914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7894f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.835441] exe[118914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7873f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988627.135485] exe[189686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988627.211010] exe[189625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988627.214072] exe[189509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612242f90 ax:7f6612243020 si:ffffffffff600000 di:55c06fb402b3 [1988627.308606] exe[218758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988649.330251] exe[163498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.385145] exe[189621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.462331] exe[189431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.523945] exe[189276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.575866] exe[189835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.631335] exe[189616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.682414] exe[189625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.730582] exe[189860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.782847] exe[197211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.829829] exe[189529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988742.725339] warn_bad_vsyscall: 20 callbacks suppressed [1988742.725341] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988742.988672] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988743.215305] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988794.448515] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988794.855934] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.212812] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.536707] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.907061] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.203531] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.536745] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.815458] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988797.089541] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988797.383756] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.475851] warn_bad_vsyscall: 11 callbacks suppressed [1988799.475854] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.690349] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.878558] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.132509] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.309109] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.486626] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988800.660134] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988800.835924] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.158567] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.333739] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.478200] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.482712] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.887022] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.030912] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.152648] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.407778] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988847.577313] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988847.807535] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.349716] warn_bad_vsyscall: 26 callbacks suppressed [1988851.349719] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.496144] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.614729] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.760743] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.954132] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.994563] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.035429] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.076985] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.122400] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.161484] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.459772] warn_bad_vsyscall: 75 callbacks suppressed [1988856.459775] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.639623] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.775856] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.821207] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.995076] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.174898] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.307867] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.595932] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.794841] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.945363] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.495182] warn_bad_vsyscall: 24 callbacks suppressed [1988861.495186] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.707615] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.833341] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.023889] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.194155] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.319642] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.527573] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.692074] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.753283] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.989481] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.503656] warn_bad_vsyscall: 76 callbacks suppressed [1988866.503660] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.567513] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.714448] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.904372] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.063708] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.216505] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.416369] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.774199] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.939170] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988868.168670] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.637036] warn_bad_vsyscall: 49 callbacks suppressed [1988871.637039] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.840277] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.960094] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.153632] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.300456] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.466171] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.654425] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.821345] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.945535] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988873.096408] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988876.900098] warn_bad_vsyscall: 23 callbacks suppressed [1988876.900101] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.071076] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.130820] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.382303] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.538177] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.585534] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.712091] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.759976] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988878.041445] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988878.194680] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.008471] warn_bad_vsyscall: 83 callbacks suppressed [1988882.008474] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.313912] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.425519] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.472232] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.687107] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.902124] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.089541] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.224962] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.422384] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.544928] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.017093] warn_bad_vsyscall: 51 callbacks suppressed [1988887.017096] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.149076] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.372712] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.508958] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.625328] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.629120] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.917665] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.054118] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.110406] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.225095] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.072750] warn_bad_vsyscall: 31 callbacks suppressed [1988892.072758] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.123925] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.312828] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.548778] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.691237] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.047197] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.261326] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.450744] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.793011] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988894.022654] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.157193] warn_bad_vsyscall: 18 callbacks suppressed [1988897.157195] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.199493] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.298558] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.334675] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.483197] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.702474] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.891285] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988898.073250] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988898.234821] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988898.346940] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988902.261269] warn_bad_vsyscall: 25 callbacks suppressed [1988902.261271] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988902.399699] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988902.650686] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988902.807440] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988903.071062] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988903.326738] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.485009] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.660063] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.938624] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988904.096215] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989133.146381] warn_bad_vsyscall: 9 callbacks suppressed [1989133.146385] exe[283467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec4a8ee506 cs:33 sp:7f50a4043f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989249.231385] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.450986] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.577029] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.621075] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989447.118208] exe[332289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fca937506 cs:33 sp:7ff035a85f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989453.105012] exe[335099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a798f35506 cs:33 sp:7ef101114f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989887.357575] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989888.181309] exe[211758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989888.279316] exe[185845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.307926] exe[185845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.339171] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.366500] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.395761] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.423310] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.451759] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.480471] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989959.656380] warn_bad_vsyscall: 57 callbacks suppressed [1989959.656383] exe[264645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989960.430020] exe[338012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989960.527746] exe[338012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989961.302427] exe[208682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989961.373152] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.166010] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.234927] exe[208597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.305255] exe[191559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989963.039628] exe[212105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989963.119018] exe[211525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1990305.633297] exe[447918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7e4bf2506 cs:33 sp:7ff01a7fef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990454.367093] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990454.535815] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990454.663673] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990494.292674] exe[465910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0de11f506 cs:33 sp:7f0d4ad27f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990553.268858] exe[470268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf4023d506 cs:33 sp:7ff3f4ffef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990572.333734] exe[473075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fec86a506 cs:33 sp:7fc20fb6bf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990654.587884] exe[462757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990654.757032] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990654.885566] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990655.020928] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990785.990637] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990786.181812] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990786.311268] exe[462757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991010.241109] exe[534629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991010.315061] exe[534637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991010.371910] exe[534645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.820201] exe[534903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.872077] exe[534909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.936393] exe[534939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.994114] exe[534951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.045871] exe[534961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.106988] exe[534972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.166527] exe[534982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991369.963130] warn_bad_vsyscall: 16 callbacks suppressed [1991369.963133] exe[554269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eceef2506 cs:33 sp:7f14df86bf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991556.017023] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991556.392929] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991556.535517] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991648.376229] exe[617302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557da0663506 cs:33 sp:7f5926640f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991741.090416] exe[476883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991741.195122] exe[631877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991741.314022] exe[476883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991747.937721] exe[483307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.021588] exe[486560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.086773] exe[520118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.159166] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.269701] exe[486569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.357257] exe[486569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.423751] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.486486] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.551539] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.603215] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1992062.291434] warn_bad_vsyscall: 14 callbacks suppressed [1992062.291437] exe[698326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8c9b506 cs:33 sp:7f56951c7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1992243.962358] exe[740205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeaf0c8506 cs:33 sp:7f7c689a5f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1992421.433565] exe[495968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4edd6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992421.562863] exe[728832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4edd6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992421.686429] exe[735260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4ed94f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992588.719394] exe[800224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559589e8a101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1992886.881846] exe[495986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992886.993232] exe[819242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992887.100600] exe[495931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a85f9bf90 ax:7f6a85f9c020 si:ffffffffff600000 di:562f2e0782b3 [1992893.741841] exe[499122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992893.823587] exe[728171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992893.944587] exe[496775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.064105] exe[496823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.183300] exe[497972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.299214] exe[727927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.446792] exe[730055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.563528] exe[544128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.690318] exe[498878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.805453] exe[727452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992919.748157] warn_bad_vsyscall: 6 callbacks suppressed [1992919.748160] exe[646627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2bdbf90 ax:7f2dc2bdc020 si:ffffffffff600000 di:55a70b07e2b3 [1992919.854680] exe[646627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2bbaf90 ax:7f2dc2bbb020 si:ffffffffff600000 di:55a70b07e2b3 [1992920.080271] exe[669866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2b99f90 ax:7f2dc2b9a020 si:ffffffffff600000 di:55a70b07e2b3 [1992933.160879] exe[861923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efeb8cc506 cs:33 sp:7ee5a075ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1993917.294559] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993917.536365] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.565406] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.596915] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.628716] exe[705902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.660390] exe[705902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.693632] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.724090] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.758727] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.790220] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993922.338691] warn_bad_vsyscall: 31 callbacks suppressed [1993922.338694] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.545257] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.678991] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.850407] exe[646728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993923.000553] exe[646877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1994065.224000] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.289340] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.351036] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.428810] exe[648501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.520290] exe[646942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.643501] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06578e8 ax:ffffffffff600000 si:7f39a0657e08 di:ffffffffff600000 [1994065.728330] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.811554] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.811724] exe[648593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994065.910103] exe[646673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994070.882181] warn_bad_vsyscall: 132 callbacks suppressed [1994070.882185] exe[700413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994070.971843] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.053168] exe[646888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.151011] exe[646942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.236842] exe[646870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.331704] exe[646900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.465084] exe[646876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.550945] exe[657287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.638988] exe[646733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.790687] exe[646622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994075.889588] warn_bad_vsyscall: 73 callbacks suppressed [1994075.889590] exe[657291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.032745] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.217096] exe[701068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.327032] exe[700607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.384423] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06368e8 ax:ffffffffff600000 si:7f39a0636e08 di:ffffffffff600000 [1994076.508413] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.601904] exe[646940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.628052] exe[646940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.727413] exe[662864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.839167] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994080.964863] warn_bad_vsyscall: 171 callbacks suppressed [1994080.964866] exe[866353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.098270] exe[646594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.184979] exe[646908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.586411] exe[648538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.663158] exe[646842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.695092] exe[654477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.787597] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.887286] exe[662856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.981425] exe[646747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994082.011606] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.062768] warn_bad_vsyscall: 100 callbacks suppressed [1994086.062771] exe[662887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.067687] exe[646696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994086.196368] exe[662887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.319158] exe[700432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.464478] exe[658583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.569529] exe[646607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.677310] exe[646673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.777815] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.815147] exe[646690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.939883] exe[646747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.109183] warn_bad_vsyscall: 97 callbacks suppressed [1994091.109186] exe[646617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.227568] exe[646704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.362625] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.686733] exe[646700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.799908] exe[646716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.834706] exe[646723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.941768] exe[646716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994092.033290] exe[657262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994092.128792] exe[662864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994093.151290] exe[646704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.131932] warn_bad_vsyscall: 29 callbacks suppressed [1994096.131935] exe[646696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.241804] exe[646877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.321108] exe[646681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.349263] exe[646681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.434405] exe[646738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.523766] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.622062] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.704360] exe[843149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.814345] exe[648538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.888926] exe[646733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.367577] warn_bad_vsyscall: 80 callbacks suppressed [1994101.367580] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.495483] exe[700607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.590732] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1995101.661803] exe[141065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995101.715488] exe[139000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995101.755431] exe[138034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995207.119110] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995207.288514] exe[658279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995207.466163] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995832.530567] exe[171611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.592997] exe[171633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.646150] exe[138312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.646214] exe[171624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ac4f90 ax:7f1539ac5020 si:ffffffffff600000 di:556c1aba72b3 [1997201.093804] exe[413417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.135704] exe[421195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.922512] exe[413391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.948114] exe[413626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0abf8e8 ax:ffffffffff600000 si:7f45c0abfe08 di:ffffffffff600000 [1997630.947045] exe[337113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997631.074901] exe[390832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997631.075683] exe[389330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997631.205090] exe[336043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997639.317282] exe[388432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.392608] exe[336055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.466297] exe[388432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.540623] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.616992] exe[408241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.700083] exe[336324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.797874] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.882726] exe[387189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.968134] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997640.078197] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.497028] warn_bad_vsyscall: 12 callbacks suppressed [1997698.497031] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.605938] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.707028] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.707284] exe[335934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997698.836285] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.929233] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997699.023705] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997699.051466] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997699.142698] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997699.248493] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.572520] warn_bad_vsyscall: 120 callbacks suppressed [1997703.572524] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.679555] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.763041] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.795813] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.887256] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.971656] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.974308] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997704.082265] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997704.104563] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997704.216792] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.625771] warn_bad_vsyscall: 91 callbacks suppressed [1997708.625774] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.653829] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.745651] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.832803] exe[389348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.915151] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997709.019396] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.118778] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.237273] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.237844] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997709.374624] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.698879] warn_bad_vsyscall: 150 callbacks suppressed [1997713.698881] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.828705] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.947109] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997714.068001] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997714.709907] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.023054] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.133020] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.176265] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997715.276585] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.393444] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.722632] warn_bad_vsyscall: 44 callbacks suppressed [1997718.722635] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.808219] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997718.879384] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.881333] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997718.982806] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.097541] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.132830] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997719.206963] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.302056] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.378417] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997723.807162] warn_bad_vsyscall: 144 callbacks suppressed [1997723.807166] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98788e8 ax:ffffffffff600000 si:7fe8e9878e08 di:ffffffffff600000 [1997723.911817] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997723.946117] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.022290] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.124943] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.150839] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.233678] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.348830] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.464502] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997724.571864] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997736.572493] warn_bad_vsyscall: 89 callbacks suppressed [1997736.572497] exe[424983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.646724] exe[448250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.696796] exe[448187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.749322] exe[452827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997736.878190] exe[448258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997736.968238] exe[446720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.044281] exe[424837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.121524] exe[424802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.195721] exe[446591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.258043] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997741.631735] warn_bad_vsyscall: 120 callbacks suppressed [1997741.631739] exe[448187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997741.771812] exe[424803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997741.899031] exe[425411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.020931] exe[425161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.377324] exe[424696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.444762] exe[446568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.516370] exe[424667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.596381] exe[448634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.660588] exe[424732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997742.735906] exe[446585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.651384] warn_bad_vsyscall: 207 callbacks suppressed [1997746.651389] exe[424821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.757401] exe[486177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.823102] exe[424766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.846533] exe[424821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.912389] exe[425047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.997607] exe[424989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.103782] exe[486144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.159861] exe[424997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.232665] exe[424696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.331687] exe[424820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997752.324285] warn_bad_vsyscall: 156 callbacks suppressed [1997752.324289] exe[425154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997752.354381] exe[424985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997753.170594] exe[424803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997753.236186] exe[425002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.030504] exe[425055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.089772] exe[486144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.141304] exe[425390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.162177] exe[424985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.189319] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.211479] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.375819] warn_bad_vsyscall: 321 callbacks suppressed [1997757.375823] exe[448258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.444293] exe[424837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.505088] exe[448216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.527417] exe[448254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.583130] exe[425432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.584763] exe[424729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997757.653174] exe[424802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.712318] exe[448203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.738311] exe[487414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.787334] exe[425390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1998216.298868] warn_bad_vsyscall: 197 callbacks suppressed [1998216.298872] exe[489137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998216.375195] exe[446625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998216.451926] exe[446594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998307.641864] exe[531738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562642c3b506 cs:33 sp:7f4ba7f0b8e8 ax:ffffffffff600000 si:7f4ba7f0be08 di:ffffffffff600000 [1998319.597620] exe[571402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d0812e506 cs:33 sp:7efff2a228e8 ax:ffffffffff600000 si:7efff2a22e08 di:ffffffffff600000 [1998336.231470] exe[543281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee7186506 cs:33 sp:7fc3fa8bf8e8 ax:ffffffffff600000 si:7fc3fa8bfe08 di:ffffffffff600000 [1998369.358701] exe[580850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b80e30d506 cs:33 sp:7efe5c93c8e8 ax:ffffffffff600000 si:7efe5c93ce08 di:ffffffffff600000 [1998390.483993] exe[387194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.572580] exe[335997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.646944] exe[439420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.665542] exe[586028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998504.903331] exe[603922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca0288b506 cs:33 sp:7f1f53c458e8 ax:ffffffffff600000 si:7f1f53c45e08 di:ffffffffff600000 [1998862.441363] exe[666434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c77ac76506 cs:33 sp:7f55b917c8e8 ax:ffffffffff600000 si:7f55b917ce08 di:ffffffffff600000 [1998968.372121] exe[301567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998968.586694] exe[391138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998968.763041] exe[333611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998968.763858] exe[317264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998980.618816] exe[390979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998980.779951] exe[317426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998980.946429] exe[375831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.120008] exe[333839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.292151] exe[390902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.456206] exe[298720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.604714] exe[376819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.766737] exe[408618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.912638] exe[420188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998982.038239] exe[375831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998988.932448] warn_bad_vsyscall: 4 callbacks suppressed [1998988.932451] exe[409550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.088543] exe[408936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.092984] exe[348389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998989.391916] exe[387890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.652623] exe[387890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.862014] exe[317497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.035722] exe[316030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.205807] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.472256] exe[317719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.472900] exe[511816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998994.004903] warn_bad_vsyscall: 18 callbacks suppressed [1998994.004906] exe[301592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998994.808494] exe[472232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.032306] exe[391138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.032652] exe[330257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998995.240509] exe[333462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.372762] exe[390937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.523147] exe[371961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.662085] exe[371961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.785544] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.816997] exe[301558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.138245] warn_bad_vsyscall: 74 callbacks suppressed [1998999.138248] exe[350256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.185620] exe[356854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.354858] exe[399649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.592887] exe[390887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.803886] exe[316045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.835008] exe[315869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999000.381969] exe[317343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999000.513010] exe[317444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999001.335044] exe[333655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999001.503892] exe[400452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.201378] warn_bad_vsyscall: 78 callbacks suppressed [1999004.201381] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.350031] exe[387222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.384591] exe[418132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.520157] exe[317343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.686708] exe[317368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.917123] exe[403700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999005.025783] exe[317347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999005.252054] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999005.252256] exe[333611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999005.452105] exe[319462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.222241] warn_bad_vsyscall: 13 callbacks suppressed [1999009.222244] exe[318883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.430845] exe[320469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.584749] exe[406055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.770558] exe[387084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.898408] exe[390973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.938206] exe[390931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999010.106298] exe[399655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.251880] exe[390257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.280202] exe[390257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.402928] exe[316051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.260598] warn_bad_vsyscall: 79 callbacks suppressed [1999014.260600] exe[301545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.399275] exe[381292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.557271] exe[333462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.699611] exe[382506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.844476] exe[533947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.036999] exe[546074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.227451] exe[400909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999015.392719] exe[399620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999015.539228] exe[469181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.658291] exe[390902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.480472] warn_bad_vsyscall: 25 callbacks suppressed [1999019.480475] exe[330637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.481159] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999019.721304] exe[333626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.844808] exe[316281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.068775] exe[391070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.295304] exe[315721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.544276] exe[391062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999021.445822] exe[410501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999022.449133] exe[390934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999023.367767] exe[469209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.578035] warn_bad_vsyscall: 38 callbacks suppressed [1999024.578037] exe[316333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.729494] exe[348437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.799649] exe[317426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999024.958029] exe[316308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.087784] exe[471165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.244647] exe[390937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.408314] exe[400720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999025.567571] exe[317248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.735420] exe[316428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999026.626672] exe[387010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999030.007550] warn_bad_vsyscall: 9 callbacks suppressed [1999030.007553] exe[513568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999030.193558] exe[543427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999030.933261] exe[298709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.100907] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.857863] exe[395194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.906161] exe[316302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999032.058974] exe[400909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.208935] exe[390908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.331647] exe[297078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.370073] exe[297078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999035.034779] warn_bad_vsyscall: 75 callbacks suppressed [1999035.034783] exe[628777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.107882] exe[653968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.167637] exe[653968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.167770] exe[514954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac738e8 ax:ffffffffff600000 si:7f28bac73e08 di:ffffffffff600000 [1999035.212590] exe[333429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.314826] exe[390887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.371900] exe[333429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.424448] exe[390908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.513430] exe[350260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.574851] exe[350260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999040.437917] warn_bad_vsyscall: 87 callbacks suppressed [1999040.437921] exe[317410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999040.480277] exe[336597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999040.645735] exe[387041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999041.634937] exe[418536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.107880] exe[390231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.285311] exe[298709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.416919] exe[309660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.568736] exe[535414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.598958] exe[471046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.749435] exe[315852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.513645] warn_bad_vsyscall: 11 callbacks suppressed [1999045.513647] exe[294746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.660643] exe[386990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.793438] exe[387042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.968469] exe[409341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999046.116742] exe[317251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.145883] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.171581] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.199585] exe[310806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.226869] exe[349102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.254695] exe[349102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999050.576874] warn_bad_vsyscall: 56 callbacks suppressed [1999050.576877] exe[315883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.191405] exe[319415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.473267] exe[315856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.601896] exe[348391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999052.142654] exe[473388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999052.289158] exe[319462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.045586] exe[316105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.166703] exe[316115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.352926] exe[326291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.386986] exe[319425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.602858] warn_bad_vsyscall: 77 callbacks suppressed [1999055.602861] exe[409550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.735852] exe[315622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.880553] exe[317367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.060021] exe[319783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.236981] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.415153] exe[309154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.560308] exe[413698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.672978] exe[335038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.820464] exe[309092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999057.002720] exe[335029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999278.805930] warn_bad_vsyscall: 17 callbacks suppressed [1999278.805934] exe[750515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999278.872036] exe[750519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999278.930082] exe[750525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.398017] exe[751508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.544464] exe[751568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.696033] exe[751599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.866791] exe[751622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.040747] exe[751669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.186064] exe[751685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.262557] exe[751711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.338023] exe[751721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.443638] exe[751732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.507152] exe[751741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999289.410031] warn_bad_vsyscall: 147 callbacks suppressed [1999289.410035] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.460448] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.482808] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.511625] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.532995] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.554725] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.577238] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.598646] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.618939] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.639857] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999294.480869] warn_bad_vsyscall: 280 callbacks suppressed [1999294.480873] exe[752972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.556104] exe[752979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.639346] exe[752986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.705646] exe[752997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.771400] exe[753003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.869281] exe[753013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.967914] exe[753020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.065703] exe[753027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.121309] exe[753034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.207874] exe[753041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.490686] warn_bad_vsyscall: 286 callbacks suppressed [1999299.490690] exe[753705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.594502] exe[753754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.686243] exe[753788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.761865] exe[753804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.835590] exe[753822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.901144] exe[753837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.973879] exe[753855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.051001] exe[753872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.126955] exe[753887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.196520] exe[753892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.233484] warn_bad_vsyscall: 165 callbacks suppressed [1999305.233487] exe[754589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.317729] exe[754594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.395967] exe[754601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.463780] exe[754609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.557104] exe[754619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.625583] exe[754634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.712443] exe[754646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.805023] exe[754656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.923561] exe[754668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.995461] exe[754676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999490.618537] warn_bad_vsyscall: 8 callbacks suppressed [1999490.618540] exe[729776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651daaec506 cs:33 sp:7f1e6b5bd8e8 ax:ffffffffff600000 si:7f1e6b5bde08 di:ffffffffff600000 [1999573.587278] exe[424986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999573.665946] exe[448182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999573.750330] exe[494957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999655.955649] exe[787753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0d0485506 cs:33 sp:7f19f3b828e8 ax:ffffffffff600000 si:7f19f3b82e08 di:ffffffffff600000 [1999721.084024] exe[818650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0be5b506 cs:33 sp:7f38140a48e8 ax:ffffffffff600000 si:7f38140a4e08 di:ffffffffff600000 [1999843.663088] exe[808369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac57608e8 ax:ffffffffff600000 si:7fdac5760e08 di:ffffffffff600000 [1999843.799284] exe[786823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac573f8e8 ax:ffffffffff600000 si:7fdac573fe08 di:ffffffffff600000 [1999843.922346] exe[798634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac57608e8 ax:ffffffffff600000 si:7fdac5760e08 di:ffffffffff600000 [1999851.682139] exe[792730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999851.786576] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999851.900862] exe[827005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.082862] exe[748399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.183901] exe[787563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.294482] exe[787173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.385644] exe[787011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.472373] exe[826979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.562781] exe[808414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.673586] exe[787562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.674871] exe[788014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.771260] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.888821] exe[714383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000799.049648] exe[787261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.192442] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.353788] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.354304] exe[808399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000799.491549] exe[730263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.605897] exe[827749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.698854] exe[795060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.726651] warn_bad_vsyscall: 18 callbacks suppressed [2000803.726655] exe[788012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.839581] exe[796057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.874663] exe[797188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1dd8e8 ax:ffffffffff600000 si:7f853e1dde08 di:ffffffffff600000 [2000803.997909] exe[789123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.098917] exe[799066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.203350] exe[798761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000804.299702] exe[796233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.331429] exe[799060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000804.454037] exe[810148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.597955] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000809.108018] warn_bad_vsyscall: 43 callbacks suppressed [2000809.108020] exe[826958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000810.032374] exe[798663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000810.974084] exe[787231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.086915] exe[808475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.121705] exe[830758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.224391] exe[703139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000811.342072] exe[787196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.453001] exe[796093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.496082] exe[799060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1dd8e8 ax:ffffffffff600000 si:7f853e1dde08 di:ffffffffff600000 [2000811.615851] exe[703084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.141220] warn_bad_vsyscall: 18 callbacks suppressed [2000814.141223] exe[808462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000814.264608] exe[798660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.367183] exe[787310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.473725] exe[796018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.507632] exe[796018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.604582] exe[734159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.717463] exe[787165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.823867] exe[787536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.918007] exe[783204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.952284] exe[795060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.145349] warn_bad_vsyscall: 56 callbacks suppressed [2000819.145352] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.180094] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.210436] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.241465] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.272651] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.304259] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.334222] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.367878] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.397831] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.426803] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.220728] warn_bad_vsyscall: 92 callbacks suppressed [2000824.220731] exe[788005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.327764] exe[828578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.427157] exe[787208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.543349] exe[827749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.653745] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.800869] exe[787208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.042589] exe[796046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.107317] exe[798654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.231961] exe[787339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.328092] exe[787284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000830.107830] warn_bad_vsyscall: 23 callbacks suppressed [2000830.107833] exe[808370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000830.999403] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000831.893648] exe[798633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.009735] exe[787563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.012683] exe[787166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000832.143207] exe[788000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.145201] exe[792661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000832.267407] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.369352] exe[703084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.478617] exe[787994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.161577] warn_bad_vsyscall: 85 callbacks suppressed [2000835.161579] exe[914706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.165598] exe[788012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000835.300640] exe[787129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.342525] exe[789066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000835.449018] exe[787304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.540509] exe[914706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.798942] exe[941175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.901223] exe[808414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000836.805310] exe[908842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000836.892039] exe[788008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000840.205191] warn_bad_vsyscall: 19 callbacks suppressed [2000840.205194] exe[796067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.331413] exe[703069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.333956] exe[941175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000840.490547] exe[792661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.613662] exe[787562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.722000] exe[787165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.817039] exe[703069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.846210] exe[730263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.951110] exe[787310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000841.058982] exe[788632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2001024.422897] warn_bad_vsyscall: 24 callbacks suppressed [2001024.422902] exe[61672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001024.485734] exe[966984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001024.485959] exe[967344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde8ffef90 ax:7fcde8fff020 si:ffffffffff600000 di:564cc97262b3 [2001024.556998] exe[31976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001098.839972] exe[797159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.637074] exe[714401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.755736] exe[796093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.803194] exe[787176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001387.629506] exe[161662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001388.490032] exe[160338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001388.519386] exe[159784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001389.383595] exe[159286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001389.394314] exe[158166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010b8cf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001390.253180] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001391.118089] exe[158048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001391.981728] exe[157991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001392.851633] exe[161595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001393.724950] exe[157991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001394.602472] exe[161648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001395.455497] exe[158146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001396.320519] exe[159608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001397.194355] exe[161732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001398.060892] exe[158463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001398.939544] exe[162367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001399.785952] exe[161738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001452.414100] exe[158462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001453.278284] exe[159537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001453.287705] exe[158002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001454.153743] exe[158293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001454.158597] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.020348] exe[177216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.022540] exe[158463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.885107] exe[177156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.888761] exe[161352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001456.736700] exe[177218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.634668] warn_bad_vsyscall: 1 callbacks suppressed [2001457.634671] exe[159739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.653273] exe[177151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.715447] exe[158414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.483425] exe[177156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.493948] exe[161542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.501910] exe[177218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.581733] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.362193] exe[158129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.369948] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.374034] exe[158396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.819299] warn_bad_vsyscall: 13 callbacks suppressed [2001462.819303] exe[177269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.830006] exe[177251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.834818] exe[158465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.895872] exe[158002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.676126] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.691575] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.691868] exe[158099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.756335] exe[157979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001464.547983] exe[177188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001464.559589] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001467.995653] warn_bad_vsyscall: 16 callbacks suppressed [2001467.995657] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.052461] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.056657] exe[160138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.058852] exe[157979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.094933] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.164470] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.218324] exe[177269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.284448] exe[162644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [2001468.868542] exe[158688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.911615] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [2001473.186754] warn_bad_vsyscall: 18 callbacks suppressed [2001473.186758] exe[159284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001473.189676] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.039059] exe[158210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.051315] exe[177272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.895371] exe[177174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.909379] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001475.753568] exe[161333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001475.766795] exe[158210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001476.608780] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001476.627284] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001478.317455] warn_bad_vsyscall: 2 callbacks suppressed [2001478.317459] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001478.339693] exe[159192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.178287] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.191503] exe[159550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.240236] exe[158204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.033861] exe[161289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.047240] exe[158396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.097669] exe[158204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.887302] exe[161333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.957176] exe[158149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001483.462503] warn_bad_vsyscall: 4 callbacks suppressed [2001483.462506] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001483.530897] exe[158198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001484.314778] exe[161352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001484.403208] exe[157983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001485.254745] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001486.121559] exe[158187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001486.995810] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001487.866765] exe[158187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001488.720690] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001489.580936] exe[158198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001490.436936] exe[158291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001491.298501] exe[158213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001697.896026] exe[211904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f188d6506 cs:33 sp:7ec6648c18e8 ax:ffffffffff600000 si:7ec6648c1e08 di:ffffffffff600000