42 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:01.947248 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:01.947817 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:01.948188 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:01.959482 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:01.959954 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:01.960369 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:01.960614 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:01.963947 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:01.964259 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:01.966535 678849 usertrap_amd64.go:212] [ 21319: 21319] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:01.966640 678849 usertrap_amd64.go:122] [ 21319: 21319] Allocate a new trap: 0xc00046a5a0 40 D0307 12:03:01.966714 678849 usertrap_amd64.go:225] [ 21319: 21319] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:01.969687 678849 task_exit.go:204] [ 21319: 21319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.969853 678849 task_signals.go:204] [ 21319: 21328] Signal 21319, PID: 21328, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.970042 678849 task_signals.go:204] [ 21319: 21327] Signal 21319, PID: 21327, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.970190 678849 task_signals.go:204] [ 21319: 21325] Signal 21319, PID: 21325, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.970524 678849 task_exit.go:204] [ 21319: 21328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.971545 678849 task_exit.go:204] [ 21319: 21327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.971951 678849 task_exit.go:204] [ 21319: 21327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.972044 678849 task_exit.go:204] [ 21319: 21327] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.972190 678849 task_exit.go:204] [ 21319: 21325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.972334 678849 task_exit.go:204] [ 21319: 21328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.972405 678849 task_exit.go:204] [ 21319: 21328] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.973345 678849 task_exit.go:204] [ 21319: 21319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.978158 678849 task_exit.go:204] [ 21319: 21325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.978252 678849 task_exit.go:204] [ 21319: 21325] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.978425 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:01.978492 678849 usertrap_amd64.go:212] [ 21330: 21330] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:01.978620 678849 usertrap_amd64.go:122] [ 21330: 21330] Allocate a new trap: 0xc00925e8a0 38 D0307 12:03:01.979073 678849 usertrap_amd64.go:225] [ 21330: 21330] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:01.979078 678849 task_exit.go:204] [ 21319: 21319] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x50e0, 0x8000}) D0307 12:03:01.986900 678849 usertrap_amd64.go:212] [ 21322: 21322] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:01.986997 678849 usertrap_amd64.go:122] [ 21322: 21322] Allocate a new trap: 0xc006128360 40 D0307 12:03:01.987058 678849 usertrap_amd64.go:225] [ 21322: 21322] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:01.990909 678849 task_exit.go:204] [ 21322: 21322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.991164 678849 task_exit.go:204] [ 21322: 21322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.991237 678849 usertrap_amd64.go:212] [ 21330: 21330] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:01.991328 678849 usertrap_amd64.go:122] [ 21330: 21330] Allocate a new trap: 0xc00925e8a0 39 D0307 12:03:01.991430 678849 usertrap_amd64.go:225] [ 21330: 21330] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:01.993450 678849 task_signals.go:204] [ 21322: 21329] Signal 21322, PID: 21329, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.993583 678849 task_exit.go:204] [ 21322: 21329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.993703 678849 task_signals.go:204] [ 21322: 21333] Signal 21322, PID: 21333, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.993753 678849 task_signals.go:204] [ 21322: 21331] Signal 21322, PID: 21331, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:01.993835 678849 task_exit.go:204] [ 21322: 21333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.994073 678849 task_exit.go:204] [ 21322: 21331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:01.994295 678849 task_exit.go:204] [ 21322: 21331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.994341 678849 task_exit.go:204] [ 21322: 21331] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.994649 678849 task_exit.go:204] [ 21322: 21333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.994804 678849 task_exit.go:204] [ 21322: 21333] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.997070 678849 task_exit.go:204] [ 21322: 21329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:01.997184 678849 task_exit.go:204] [ 21322: 21329] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.997283 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:01.997462 678849 task_exit.go:204] [ 21322: 21322] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:01.999397 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:01.999849 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.003131 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.003542 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r0, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x5d36444d}, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getuid() setresuid(0xffffffffffffffff, 0x0, r1) (async) keyctl$get_persistent(0x16, r1, 0x0) D0307 12:03:02.010539 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.012072 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.020684 678849 usertrap_amd64.go:212] [ 21332: 21332] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.020767 678849 usertrap_amd64.go:122] [ 21332: 21332] Allocate a new trap: 0xc009cac750 38 D0307 12:03:02.021197 678849 usertrap_amd64.go:225] [ 21332: 21332] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.022999 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.023314 678849 usertrap_amd64.go:212] [ 21332: 21332] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.023415 678849 usertrap_amd64.go:122] [ 21332: 21332] Allocate a new trap: 0xc009cac750 39 D0307 12:03:02.023310 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.023508 678849 usertrap_amd64.go:225] [ 21332: 21332] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.023987 678849 usertrap_amd64.go:212] [ 21330: 21330] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.024113 678849 usertrap_amd64.go:122] [ 21330: 21330] Allocate a new trap: 0xc00925e8a0 40 D0307 12:03:02.024178 678849 usertrap_amd64.go:225] [ 21330: 21330] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.026542 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.026768 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.030468 678849 task_exit.go:204] [ 21330: 21330] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.030827 678849 task_signals.go:204] [ 21330: 21334] Signal 21330, PID: 21334, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.031182 678849 task_exit.go:204] [ 21330: 21330] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.031517 678849 task_exit.go:204] [ 21330: 21334] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.034930 678849 task_exit.go:204] [ 21330: 21334] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.034987 678849 task_exit.go:204] [ 21330: 21334] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.035061 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.036085 678849 task_exit.go:204] [ 21330: 21330] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) D0307 12:03:02.039796 678849 usertrap_amd64.go:212] [ 21336: 21336] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.039939 678849 usertrap_amd64.go:122] [ 21336: 21336] Allocate a new trap: 0xc00037ef90 38 D0307 12:03:02.040725 678849 usertrap_amd64.go:225] [ 21336: 21336] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.045622 678849 usertrap_amd64.go:212] [ 21335: 21335] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.045845 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.045889 678849 usertrap_amd64.go:122] [ 21335: 21335] Allocate a new trap: 0xc0007f2480 38 D0307 12:03:02.046386 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.046414 678849 usertrap_amd64.go:225] [ 21335: 21335] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.049116 678849 usertrap_amd64.go:212] [ 21335: 21335] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.049223 678849 usertrap_amd64.go:122] [ 21335: 21335] Allocate a new trap: 0xc0007f2480 39 D0307 12:03:02.049369 678849 usertrap_amd64.go:225] [ 21335: 21335] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.052106 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.052523 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.053617 678849 usertrap_amd64.go:212] [ 21336: 21336] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.053711 678849 usertrap_amd64.go:122] [ 21336: 21336] Allocate a new trap: 0xc00037ef90 39 D0307 12:03:02.053826 678849 usertrap_amd64.go:225] [ 21336: 21336] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.054688 678849 usertrap_amd64.go:212] [ 21332: 21332] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.054819 678849 usertrap_amd64.go:122] [ 21332: 21332] Allocate a new trap: 0xc009cac750 40 D0307 12:03:02.054955 678849 usertrap_amd64.go:225] [ 21332: 21332] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.057220 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.057610 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.058020 678849 task_exit.go:204] [ 21332: 21332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.058194 678849 task_signals.go:204] [ 21332: 21337] Signal 21332, PID: 21337, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.058612 678849 task_exit.go:204] [ 21332: 21332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.059233 678849 task_exit.go:204] [ 21332: 21337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.062431 678849 task_exit.go:204] [ 21332: 21337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.062529 678849 task_exit.go:204] [ 21332: 21337] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.062630 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.062993 678849 task_exit.go:204] [ 21332: 21332] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80800) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.072183 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.072499 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.075653 678849 usertrap_amd64.go:212] [ 21338: 21338] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.075741 678849 usertrap_amd64.go:122] [ 21338: 21338] Allocate a new trap: 0xc00925e9f0 38 D0307 12:03:02.076156 678849 usertrap_amd64.go:225] [ 21338: 21338] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.078213 678849 usertrap_amd64.go:212] [ 21338: 21338] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.078298 678849 usertrap_amd64.go:122] [ 21338: 21338] Allocate a new trap: 0xc00925e9f0 39 D0307 12:03:02.078366 678849 usertrap_amd64.go:225] [ 21338: 21338] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.079057 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.079400 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.085915 678849 usertrap_amd64.go:212] [ 21335: 21335] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.086000 678849 usertrap_amd64.go:122] [ 21335: 21335] Allocate a new trap: 0xc0007f2480 40 D0307 12:03:02.086080 678849 usertrap_amd64.go:225] [ 21335: 21335] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.093657 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.093840 678849 task_exit.go:204] [ 21335: 21335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.093928 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x50e0, 0x8000}) D0307 12:03:02.094182 678849 task_signals.go:204] [ 21335: 21339] Signal 21335, PID: 21339, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.094330 678849 task_exit.go:204] [ 21335: 21335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.094473 678849 task_exit.go:204] [ 21335: 21339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.096128 678849 task_exit.go:204] [ 21335: 21339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.096195 678849 task_exit.go:204] [ 21335: 21339] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.096276 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.096744 678849 task_exit.go:204] [ 21335: 21335] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.105537 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.105813 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.120320 678849 usertrap_amd64.go:212] [ 21336: 21336] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.120414 678849 usertrap_amd64.go:122] [ 21336: 21336] Allocate a new trap: 0xc00037ef90 40 D0307 12:03:02.120493 678849 usertrap_amd64.go:225] [ 21336: 21336] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.124295 678849 task_exit.go:204] [ 21336: 21336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.124462 678849 task_signals.go:204] [ 21336: 21342] Signal 21336, PID: 21342, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.124562 678849 task_signals.go:204] [ 21336: 21341] Signal 21336, PID: 21341, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.124612 678849 task_exit.go:204] [ 21336: 21342] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.124931 678849 task_exit.go:204] [ 21336: 21342] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.125048 678849 task_exit.go:204] [ 21336: 21342] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.125282 678849 task_exit.go:204] [ 21336: 21341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.126403 678849 task_exit.go:204] [ 21336: 21336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.126905 678849 task_exit.go:204] [ 21336: 21341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.126959 678849 task_exit.go:204] [ 21336: 21341] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.127130 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.127294 678849 task_exit.go:204] [ 21336: 21336] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xb) D0307 12:03:02.133799 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.134120 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.134508 678849 usertrap_amd64.go:212] [ 21338: 21338] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.134596 678849 usertrap_amd64.go:122] [ 21338: 21338] Allocate a new trap: 0xc00925e9f0 40 D0307 12:03:02.134696 678849 usertrap_amd64.go:225] [ 21338: 21338] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.135784 678849 usertrap_amd64.go:212] [ 21340: 21340] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.135820 678849 usertrap_amd64.go:212] [ 21344: 21344] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.135878 678849 usertrap_amd64.go:122] [ 21340: 21340] Allocate a new trap: 0xc006bd8c90 38 D0307 12:03:02.135904 678849 usertrap_amd64.go:122] [ 21344: 21344] Allocate a new trap: 0xc007186540 38 D0307 12:03:02.136352 678849 usertrap_amd64.go:225] [ 21344: 21344] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.137684 678849 usertrap_amd64.go:225] [ 21340: 21340] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.137883 678849 task_exit.go:204] [ 21338: 21338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.138163 678849 task_signals.go:204] [ 21338: 21343] Signal 21338, PID: 21343, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.138283 678849 task_exit.go:204] [ 21338: 21343] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.138535 678849 task_exit.go:204] [ 21338: 21338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.141159 678849 task_exit.go:204] [ 21338: 21343] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.141272 678849 task_exit.go:204] [ 21338: 21343] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.141416 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.141355 678849 usertrap_amd64.go:212] [ 21340: 21340] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.141543 678849 usertrap_amd64.go:122] [ 21340: 21340] Allocate a new trap: 0xc006bd8c90 39 D0307 12:03:02.141654 678849 usertrap_amd64.go:225] [ 21340: 21340] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.143143 678849 task_exit.go:204] [ 21338: 21338] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) D0307 12:03:02.145731 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.146109 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.146510 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.146891 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.147955 678849 usertrap_amd64.go:212] [ 21344: 21344] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.148098 678849 usertrap_amd64.go:122] [ 21344: 21344] Allocate a new trap: 0xc007186540 39 D0307 12:03:02.148186 678849 usertrap_amd64.go:225] [ 21344: 21344] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.149958 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.150348 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.157766 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.158105 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.178598 678849 usertrap_amd64.go:212] [ 21340: 21340] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.178684 678849 usertrap_amd64.go:122] [ 21340: 21340] Allocate a new trap: 0xc006bd8c90 40 D0307 12:03:02.178771 678849 usertrap_amd64.go:225] [ 21340: 21340] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.184559 678849 task_exit.go:204] [ 21340: 21340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.184708 678849 task_signals.go:204] [ 21340: 21346] Signal 21340, PID: 21346, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.184843 678849 task_exit.go:204] [ 21340: 21346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.185406 678849 task_exit.go:204] [ 21340: 21346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.185512 678849 task_exit.go:204] [ 21340: 21346] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.186618 678849 task_exit.go:204] [ 21340: 21340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.186713 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.186931 678849 task_exit.go:204] [ 21340: 21340] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.187942 678849 usertrap_amd64.go:212] [ 21345: 21345] Found the pattern at ip 55c787e67490:sysno 109 12:03:02 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80800) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_serviced\x00', 0x0, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.188042 678849 usertrap_amd64.go:122] [ 21345: 21345] Allocate a new trap: 0xc0071865a0 38 D0307 12:03:02.188499 678849 usertrap_amd64.go:225] [ 21345: 21345] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.191084 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.191540 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.194549 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.194848 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.197996 678849 usertrap_amd64.go:212] [ 21345: 21345] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.198081 678849 usertrap_amd64.go:122] [ 21345: 21345] Allocate a new trap: 0xc0071865a0 39 D0307 12:03:02.198219 678849 usertrap_amd64.go:225] [ 21345: 21345] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.199461 678849 usertrap_amd64.go:212] [ 21347: 21347] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.199546 678849 usertrap_amd64.go:122] [ 21347: 21347] Allocate a new trap: 0xc00037f1d0 38 D0307 12:03:02.199919 678849 usertrap_amd64.go:225] [ 21347: 21347] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.201057 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.201928 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.203003 678849 usertrap_amd64.go:212] [ 21347: 21347] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.203078 678849 usertrap_amd64.go:122] [ 21347: 21347] Allocate a new trap: 0xc00037f1d0 39 D0307 12:03:02.203143 678849 usertrap_amd64.go:225] [ 21347: 21347] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.205006 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.205014 678849 usertrap_amd64.go:212] [ 21344: 21344] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.205206 678849 usertrap_amd64.go:122] [ 21344: 21344] Allocate a new trap: 0xc007186540 40 D0307 12:03:02.205237 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.205315 678849 usertrap_amd64.go:225] [ 21344: 21344] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.221236 678849 task_exit.go:204] [ 21344: 21344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.221386 678849 task_signals.go:204] [ 21344: 21349] Signal 21344, PID: 21349, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.221403 678849 task_signals.go:204] [ 21344: 21348] Signal 21344, PID: 21348, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.221537 678849 task_exit.go:204] [ 21344: 21348] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.221693 678849 task_exit.go:204] [ 21344: 21348] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.221744 678849 task_exit.go:204] [ 21344: 21348] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.222046 678849 task_exit.go:204] [ 21344: 21344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.222460 678849 task_exit.go:204] [ 21344: 21349] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.222992 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.224649 678849 usertrap_amd64.go:212] [ 21350: 21350] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.224750 678849 usertrap_amd64.go:122] [ 21350: 21350] Allocate a new trap: 0xc0007f2660 38 D0307 12:03:02.224733 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.225027 678849 task_exit.go:204] [ 21344: 21349] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.225096 678849 task_exit.go:204] [ 21344: 21349] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.225182 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.225229 678849 usertrap_amd64.go:212] [ 21345: 21345] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.225128 678849 usertrap_amd64.go:225] [ 21350: 21350] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.225357 678849 usertrap_amd64.go:122] [ 21345: 21345] Allocate a new trap: 0xc0071865a0 40 D0307 12:03:02.225496 678849 usertrap_amd64.go:225] [ 21345: 21345] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.225611 678849 task_exit.go:204] [ 21344: 21344] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x50e0, 0x8000}) D0307 12:03:02.227779 678849 task_exit.go:204] [ 21345: 21345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.228034 678849 task_exit.go:204] [ 21345: 21345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.228489 678849 task_signals.go:204] [ 21345: 21351] Signal 21345, PID: 21351, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.228586 678849 task_exit.go:204] [ 21345: 21351] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.228648 678849 usertrap_amd64.go:212] [ 21350: 21350] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.228715 678849 usertrap_amd64.go:122] [ 21350: 21350] Allocate a new trap: 0xc0007f2660 39 D0307 12:03:02.228771 678849 usertrap_amd64.go:225] [ 21350: 21350] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.230680 678849 task_exit.go:204] [ 21345: 21351] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.231391 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.233037 678849 task_exit.go:204] [ 21345: 21351] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.233325 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.233364 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.234790 678849 task_exit.go:204] [ 21345: 21345] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.236122 678849 usertrap_amd64.go:212] [ 21347: 21347] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.236191 678849 usertrap_amd64.go:122] [ 21347: 21347] Allocate a new trap: 0xc00037f1d0 40 D0307 12:03:02.236362 678849 usertrap_amd64.go:225] [ 21347: 21347] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) write$P9_RSTATu(r2, &(0x7f00000000c0)={0x5a, 0x7d, 0x2, {{0x0, 0x45, 0xfffe, 0x4, {0x4, 0x1, 0x3}, 0x44000000, 0x4, 0x5, 0x2, 0x5, '-\\\'$\xc5', 0x1, '.', 0xa, '/dev/zero\x00', 0x2, '&,'}, 0x0, '', 0xffffffffffffffff, 0x0, r3}}, 0x5a) write$P9_RSTATFS(r1, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x7, 0x2, 0x100, 0x4, 0x2, 0x96, 0xfffffffffffeffff, 0x3, 0x8}}, 0x43) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x300c0, 0x0) D0307 12:03:02.244045 678849 task_exit.go:204] [ 21347: 21347] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.244197 678849 task_signals.go:204] [ 21347: 21352] Signal 21347, PID: 21352, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.244365 678849 task_exit.go:204] [ 21347: 21352] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.244598 678849 task_exit.go:204] [ 21347: 21352] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.244657 678849 task_exit.go:204] [ 21347: 21352] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.246018 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.246276 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.246550 678849 task_exit.go:204] [ 21347: 21347] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.246616 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.249043 678849 task_exit.go:204] [ 21347: 21347] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xb) D0307 12:03:02.254963 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.255320 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.257072 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.257381 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.270147 678849 usertrap_amd64.go:212] [ 21350: 21350] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.270246 678849 usertrap_amd64.go:122] [ 21350: 21350] Allocate a new trap: 0xc0007f2660 40 D0307 12:03:02.270347 678849 usertrap_amd64.go:225] [ 21350: 21350] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.270550 678849 usertrap_amd64.go:212] [ 21354: 21354] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.270651 678849 usertrap_amd64.go:122] [ 21354: 21354] Allocate a new trap: 0xc009caca20 38 D0307 12:03:02.271005 678849 usertrap_amd64.go:225] [ 21354: 21354] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.273321 678849 task_exit.go:204] [ 21350: 21350] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.273513 678849 task_signals.go:204] [ 21350: 21353] Signal 21350, PID: 21353, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.273605 678849 task_exit.go:204] [ 21350: 21353] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.273774 678849 task_exit.go:204] [ 21350: 21350] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.274920 678849 usertrap_amd64.go:212] [ 21354: 21354] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.274975 678849 usertrap_amd64.go:122] [ 21354: 21354] Allocate a new trap: 0xc009caca20 39 D0307 12:03:02.275117 678849 usertrap_amd64.go:225] [ 21354: 21354] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.276076 678849 task_exit.go:204] [ 21350: 21353] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.276141 678849 task_exit.go:204] [ 21350: 21353] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.276221 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.277099 678849 task_exit.go:204] [ 21350: 21350] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80800) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.278083 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.279773 678849 usertrap_amd64.go:212] [ 21355: 21355] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.279931 678849 usertrap_amd64.go:122] [ 21355: 21355] Allocate a new trap: 0xc00732ae70 38 D0307 12:03:02.280463 678849 usertrap_amd64.go:225] [ 21355: 21355] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.282309 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.285886 678849 usertrap_amd64.go:212] [ 21355: 21355] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.285976 678849 usertrap_amd64.go:122] [ 21355: 21355] Allocate a new trap: 0xc00732ae70 39 D0307 12:03:02.286058 678849 usertrap_amd64.go:225] [ 21355: 21355] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.288277 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.288674 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.290877 678849 usertrap_amd64.go:212] [ 21356: 21356] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.290986 678849 usertrap_amd64.go:122] [ 21356: 21356] Allocate a new trap: 0xc00925ebd0 38 D0307 12:03:02.291417 678849 usertrap_amd64.go:225] [ 21356: 21356] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.291716 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.292093 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.298941 678849 usertrap_amd64.go:212] [ 21356: 21356] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.299026 678849 usertrap_amd64.go:122] [ 21356: 21356] Allocate a new trap: 0xc00925ebd0 39 D0307 12:03:02.299107 678849 usertrap_amd64.go:225] [ 21356: 21356] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.301680 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.302021 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.304344 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.305431 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.310294 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.310578 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.314193 678849 usertrap_amd64.go:212] [ 21358: 21358] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.314280 678849 usertrap_amd64.go:122] [ 21358: 21358] Allocate a new trap: 0xc0007f26c0 38 D0307 12:03:02.315699 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.316422 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.318377 678849 usertrap_amd64.go:225] [ 21358: 21358] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.318910 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.319963 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.320539 678849 usertrap_amd64.go:212] [ 21355: 21355] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.320608 678849 usertrap_amd64.go:122] [ 21355: 21355] Allocate a new trap: 0xc00732ae70 40 D0307 12:03:02.320703 678849 usertrap_amd64.go:225] [ 21355: 21355] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.321113 678849 usertrap_amd64.go:212] [ 21354: 21354] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.321247 678849 usertrap_amd64.go:122] [ 21354: 21354] Allocate a new trap: 0xc009caca20 40 D0307 12:03:02.321375 678849 usertrap_amd64.go:225] [ 21354: 21354] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.322294 678849 usertrap_amd64.go:212] [ 21356: 21356] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.322360 678849 usertrap_amd64.go:122] [ 21356: 21356] Allocate a new trap: 0xc00925ebd0 40 D0307 12:03:02.322450 678849 usertrap_amd64.go:225] [ 21356: 21356] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.323151 678849 task_exit.go:204] [ 21355: 21355] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.323392 678849 task_exit.go:204] [ 21355: 21355] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.323675 678849 task_signals.go:204] [ 21355: 21359] Signal 21355, PID: 21359, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.323853 678849 task_exit.go:204] [ 21355: 21359] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.325267 678849 task_exit.go:204] [ 21354: 21354] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.325401 678849 task_signals.go:204] [ 21354: 21357] Signal 21354, PID: 21357, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.325505 678849 task_exit.go:204] [ 21354: 21354] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.325847 678849 task_signals.go:204] [ 21354: 21360] Signal 21354, PID: 21360, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.325960 678849 task_exit.go:204] [ 21354: 21357] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.326111 678849 task_exit.go:204] [ 21354: 21360] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.326507 678849 task_exit.go:204] [ 21355: 21359] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.326589 678849 task_exit.go:204] [ 21355: 21359] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.326869 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.328043 678849 task_exit.go:204] [ 21356: 21356] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.328323 678849 task_signals.go:204] [ 21356: 21361] Signal 21356, PID: 21361, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.328373 678849 task_exit.go:204] [ 21355: 21355] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.328534 678849 task_exit.go:204] [ 21356: 21361] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.328792 678849 task_exit.go:204] [ 21354: 21357] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.328888 678849 task_exit.go:204] [ 21354: 21357] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.329120 678849 task_exit.go:204] [ 21356: 21356] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.329397 678849 task_exit.go:204] [ 21354: 21360] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.329462 678849 task_exit.go:204] [ 21354: 21360] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.329565 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.329731 678849 task_exit.go:204] [ 21354: 21354] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) write$P9_RSTATu(r2, &(0x7f00000000c0)={0x5a, 0x7d, 0x2, {{0x0, 0x45, 0xfffe, 0x4, {0x4, 0x1, 0x3}, 0x44000000, 0x4, 0x5, 0x2, 0x5, '-\\\'$\xc5', 0x1, '.', 0xa, '/dev/zero\x00', 0x2, '&,'}, 0x0, '', 0xffffffffffffffff, 0x0, r3}}, 0x5a) write$P9_RSTATFS(r1, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x7, 0x2, 0x100, 0x4, 0x2, 0x96, 0xfffffffffffeffff, 0x3, 0x8}}, 0x43) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x300c0, 0x0) 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x127080, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:02.335178 678849 task_exit.go:204] [ 21356: 21361] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.335321 678849 task_exit.go:204] [ 21356: 21361] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.335428 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.337129 678849 task_exit.go:204] [ 21356: 21356] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xb) D0307 12:03:02.338827 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.339287 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.340155 678849 usertrap_amd64.go:212] [ 21358: 21358] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.340277 678849 usertrap_amd64.go:122] [ 21358: 21358] Allocate a new trap: 0xc0007f26c0 39 D0307 12:03:02.340339 678849 usertrap_amd64.go:225] [ 21358: 21358] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.340371 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.344369 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.346948 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.347373 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.349957 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.350326 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.362010 678849 usertrap_amd64.go:212] [ 21362: 21362] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.362135 678849 usertrap_amd64.go:122] [ 21362: 21362] Allocate a new trap: 0xc0009290e0 38 D0307 12:03:02.362509 678849 usertrap_amd64.go:225] [ 21362: 21362] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.364243 678849 usertrap_amd64.go:212] [ 21363: 21363] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.364357 678849 usertrap_amd64.go:122] [ 21363: 21363] Allocate a new trap: 0xc001fa0b40 38 D0307 12:03:02.364699 678849 usertrap_amd64.go:225] [ 21363: 21363] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.367023 678849 usertrap_amd64.go:212] [ 21363: 21363] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.367119 678849 usertrap_amd64.go:122] [ 21363: 21363] Allocate a new trap: 0xc001fa0b40 39 D0307 12:03:02.367203 678849 usertrap_amd64.go:225] [ 21363: 21363] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.367549 678849 usertrap_amd64.go:212] [ 21362: 21362] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.367620 678849 usertrap_amd64.go:122] [ 21362: 21362] Allocate a new trap: 0xc0009290e0 39 D0307 12:03:02.367710 678849 usertrap_amd64.go:225] [ 21362: 21362] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.369500 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.373376 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.377146 678849 usertrap_amd64.go:212] [ 21358: 21358] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.377253 678849 usertrap_amd64.go:122] [ 21358: 21358] Allocate a new trap: 0xc0007f26c0 40 D0307 12:03:02.377325 678849 usertrap_amd64.go:225] [ 21358: 21358] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.377901 678849 usertrap_amd64.go:212] [ 21364: 21364] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.378084 678849 usertrap_amd64.go:122] [ 21364: 21364] Allocate a new trap: 0xc0005992f0 38 D0307 12:03:02.378746 678849 usertrap_amd64.go:225] [ 21364: 21364] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.379014 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.379400 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.380930 678849 usertrap_amd64.go:212] [ 21364: 21364] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.381113 678849 usertrap_amd64.go:122] [ 21364: 21364] Allocate a new trap: 0xc0005992f0 39 D0307 12:03:02.381218 678849 task_exit.go:204] [ 21358: 21358] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.381235 678849 usertrap_amd64.go:225] [ 21364: 21364] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.381457 678849 task_signals.go:204] [ 21358: 21365] Signal 21358, PID: 21365, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.381575 678849 task_exit.go:204] [ 21358: 21358] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.381790 678849 task_exit.go:204] [ 21358: 21365] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.384277 678849 task_exit.go:204] [ 21358: 21365] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.384365 678849 task_exit.go:204] [ 21358: 21365] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.384473 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.384821 678849 task_exit.go:204] [ 21358: 21358] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.389684 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.389968 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.395473 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.395835 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.396875 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.397175 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.398188 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.398561 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.404855 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.405165 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.407957 678849 usertrap_amd64.go:212] [ 21363: 21363] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.408018 678849 usertrap_amd64.go:122] [ 21363: 21363] Allocate a new trap: 0xc001fa0b40 40 D0307 12:03:02.408090 678849 usertrap_amd64.go:225] [ 21363: 21363] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.410484 678849 task_exit.go:204] [ 21363: 21363] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.410624 678849 task_signals.go:204] [ 21363: 21366] Signal 21363, PID: 21366, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.410746 678849 task_exit.go:204] [ 21363: 21366] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.411084 678849 task_exit.go:204] [ 21363: 21363] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.412994 678849 task_exit.go:204] [ 21363: 21366] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.413062 678849 task_exit.go:204] [ 21363: 21366] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.413127 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.414908 678849 task_exit.go:204] [ 21363: 21363] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) write$P9_RSTATu(r2, &(0x7f00000000c0)={0x5a, 0x7d, 0x2, {{0x0, 0x45, 0xfffe, 0x4, {0x4, 0x1, 0x3}, 0x44000000, 0x4, 0x5, 0x2, 0x5, '-\\\'$\xc5', 0x1, '.', 0xa, '/dev/zero\x00', 0x2, '&,'}, 0x0, '', 0xffffffffffffffff, 0x0, r3}}, 0x5a) write$P9_RSTATFS(r1, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x7, 0x2, 0x100, 0x4, 0x2, 0x96, 0xfffffffffffeffff, 0x3, 0x8}}, 0x43) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x300c0, 0x0) D0307 12:03:02.422646 678849 usertrap_amd64.go:212] [ 21364: 21364] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.422753 678849 usertrap_amd64.go:122] [ 21364: 21364] Allocate a new trap: 0xc0005992f0 40 D0307 12:03:02.422864 678849 usertrap_amd64.go:225] [ 21364: 21364] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.423800 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.424157 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.425611 678849 task_exit.go:204] [ 21364: 21364] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.425651 678849 usertrap_amd64.go:212] [ 21362: 21362] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.425700 678849 usertrap_amd64.go:122] [ 21362: 21362] Allocate a new trap: 0xc0009290e0 40 D0307 12:03:02.425757 678849 usertrap_amd64.go:225] [ 21362: 21362] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.425858 678849 task_exit.go:204] [ 21364: 21364] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.425989 678849 task_signals.go:204] [ 21364: 21369] Signal 21364, PID: 21369, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.426069 678849 task_exit.go:204] [ 21364: 21369] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.428814 678849 task_exit.go:204] [ 21362: 21362] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.428976 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.429131 678849 task_signals.go:204] [ 21362: 21368] Signal 21362, PID: 21368, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.429300 678849 task_exit.go:204] [ 21364: 21369] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.429367 678849 task_exit.go:204] [ 21364: 21369] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.429349 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.429455 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.429615 678849 task_exit.go:204] [ 21362: 21368] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.429926 678849 task_exit.go:204] [ 21362: 21362] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.431617 678849 task_exit.go:204] [ 21364: 21364] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.432129 678849 task_exit.go:204] [ 21362: 21368] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.432255 678849 task_exit.go:204] [ 21362: 21368] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.432365 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 12:03:02 executing program 0: r0 = add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c9a546122af2eecd776a3edb529a202d6abae2328bbfb82ed2f68b2fa67d20dc57083a17e860fd8d96935777e114004b1814257c4b3d7f80b765b4abe47ce12b2a8e488f1d1646bd7d95e054d0cdaf73b58f4cfcef1ac7c9b52ed0faf9f8cf8a232b7ef4f7", 0x65, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d990875b292bfcffd8d7bc5e518bf5a2b8dff3ec76041f3684147b1e1a9975c6ec318595250695381628a256e7b3e58d2285a4047e2fbb0db5e1029a209dc77d", 0x36}, 0x48, r0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='%\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r1, 0x0) D0307 12:03:02.435681 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.436897 678849 usertrap_amd64.go:212] [ 21367: 21367] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.437015 678849 usertrap_amd64.go:122] [ 21367: 21367] Allocate a new trap: 0xc0007f2810 38 D0307 12:03:02.437365 678849 usertrap_amd64.go:225] [ 21367: 21367] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.437468 678849 task_exit.go:204] [ 21362: 21362] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.438990 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x127080, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:02.441386 678849 usertrap_amd64.go:212] [ 21367: 21367] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.441461 678849 usertrap_amd64.go:122] [ 21367: 21367] Allocate a new trap: 0xc0007f2810 39 D0307 12:03:02.441621 678849 usertrap_amd64.go:225] [ 21367: 21367] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.444493 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.444866 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.445244 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.445533 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.460620 678849 usertrap_amd64.go:212] [ 21371: 21371] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.460709 678849 usertrap_amd64.go:122] [ 21371: 21371] Allocate a new trap: 0xc00732b350 38 D0307 12:03:02.461111 678849 usertrap_amd64.go:225] [ 21371: 21371] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.465746 678849 usertrap_amd64.go:212] [ 21371: 21371] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.465830 678849 usertrap_amd64.go:122] [ 21371: 21371] Allocate a new trap: 0xc00732b350 39 D0307 12:03:02.465896 678849 usertrap_amd64.go:225] [ 21371: 21371] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.466989 678849 usertrap_amd64.go:212] [ 21372: 21372] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.467085 678849 usertrap_amd64.go:122] [ 21372: 21372] Allocate a new trap: 0xc00925ef60 38 D0307 12:03:02.467373 678849 usertrap_amd64.go:225] [ 21372: 21372] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.468269 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.468563 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.469209 678849 usertrap_amd64.go:212] [ 21372: 21372] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.469263 678849 usertrap_amd64.go:122] [ 21372: 21372] Allocate a new trap: 0xc00925ef60 39 D0307 12:03:02.469346 678849 usertrap_amd64.go:225] [ 21372: 21372] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.470657 678849 usertrap_amd64.go:212] [ 21370: 21370] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.470781 678849 usertrap_amd64.go:122] [ 21370: 21370] Allocate a new trap: 0xc007186840 38 D0307 12:03:02.471175 678849 usertrap_amd64.go:225] [ 21370: 21370] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.471267 678849 usertrap_amd64.go:212] [ 21367: 21367] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.471376 678849 usertrap_amd64.go:122] [ 21367: 21367] Allocate a new trap: 0xc0007f2810 40 D0307 12:03:02.471439 678849 usertrap_amd64.go:225] [ 21367: 21367] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.471920 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.472281 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.473349 678849 usertrap_amd64.go:212] [ 21370: 21370] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.473413 678849 usertrap_amd64.go:122] [ 21370: 21370] Allocate a new trap: 0xc007186840 39 D0307 12:03:02.473463 678849 usertrap_amd64.go:225] [ 21370: 21370] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.475397 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.475679 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.476666 678849 task_exit.go:204] [ 21367: 21367] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.476862 678849 task_signals.go:204] [ 21367: 21373] Signal 21367, PID: 21373, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.476989 678849 task_exit.go:204] [ 21367: 21367] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.477167 678849 task_exit.go:204] [ 21367: 21373] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.479471 678849 task_exit.go:204] [ 21367: 21373] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.479541 678849 task_exit.go:204] [ 21367: 21373] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.479670 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.480397 678849 task_exit.go:204] [ 21367: 21367] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 1: lsetxattr$smack_xattr_label(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.489652 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.489924 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.497461 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.497917 678849 usertrap_amd64.go:212] [ 21371: 21371] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.497986 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.498017 678849 usertrap_amd64.go:122] [ 21371: 21371] Allocate a new trap: 0xc00732b350 40 D0307 12:03:02.498099 678849 usertrap_amd64.go:225] [ 21371: 21371] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.498898 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.499184 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.501656 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.502697 678849 task_exit.go:204] [ 21371: 21371] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.502977 678849 task_exit.go:204] [ 21371: 21371] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.503444 678849 task_signals.go:204] [ 21371: 21374] Signal 21371, PID: 21374, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.503608 678849 task_exit.go:204] [ 21371: 21374] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.505877 678849 task_exit.go:204] [ 21371: 21374] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.506126 678849 task_exit.go:204] [ 21371: 21374] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.506290 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.508428 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.508864 678849 task_exit.go:204] [ 21371: 21371] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.509118 678849 usertrap_amd64.go:212] [ 21370: 21370] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.509203 678849 usertrap_amd64.go:122] [ 21370: 21370] Allocate a new trap: 0xc007186840 40 D0307 12:03:02.509266 678849 usertrap_amd64.go:225] [ 21370: 21370] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) 12:03:02 executing program 0: r0 = add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c9a546122af2eecd776a3edb529a202d6abae2328bbfb82ed2f68b2fa67d20dc57083a17e860fd8d96935777e114004b1814257c4b3d7f80b765b4abe47ce12b2a8e488f1d1646bd7d95e054d0cdaf73b58f4cfcef1ac7c9b52ed0faf9f8cf8a232b7ef4f7", 0x65, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d990875b292bfcffd8d7bc5e518bf5a2b8dff3ec76041f3684147b1e1a9975c6ec318595250695381628a256e7b3e58d2285a4047e2fbb0db5e1029a209dc77d", 0x36}, 0x48, r0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='%\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r1, 0x0) D0307 12:03:02.515088 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.515368 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.517063 678849 usertrap_amd64.go:212] [ 21372: 21372] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.517186 678849 usertrap_amd64.go:122] [ 21372: 21372] Allocate a new trap: 0xc00925ef60 40 D0307 12:03:02.517265 678849 usertrap_amd64.go:225] [ 21372: 21372] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.518445 678849 task_exit.go:204] [ 21370: 21370] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.518535 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.518641 678849 task_exit.go:204] [ 21370: 21370] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.519320 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.519383 678849 task_signals.go:204] [ 21370: 21375] Signal 21370, PID: 21375, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.519488 678849 task_exit.go:204] [ 21370: 21375] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.520722 678849 task_exit.go:204] [ 21372: 21372] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.520918 678849 task_signals.go:204] [ 21372: 21377] Signal 21372, PID: 21377, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.521105 678849 task_exit.go:204] [ 21372: 21377] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.521390 678849 task_exit.go:204] [ 21372: 21372] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.521762 678849 task_exit.go:204] [ 21370: 21375] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.521829 678849 task_exit.go:204] [ 21370: 21375] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.521890 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.522404 678849 task_exit.go:204] [ 21370: 21370] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) write$P9_RSTATu(r2, &(0x7f00000000c0)={0x5a, 0x7d, 0x2, {{0x0, 0x45, 0xfffe, 0x4, {0x4, 0x1, 0x3}, 0x44000000, 0x4, 0x5, 0x2, 0x5, '-\\\'$\xc5', 0x1, '.', 0xa, '/dev/zero\x00', 0x2, '&,'}, 0x0, '', 0xffffffffffffffff, 0x0, r3}}, 0x5a) write$P9_RSTATFS(r1, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x7, 0x2, 0x100, 0x4, 0x2, 0x96, 0xfffffffffffeffff, 0x3, 0x8}}, 0x43) D0307 12:03:02.529460 678849 task_exit.go:204] [ 21372: 21377] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.529542 678849 task_exit.go:204] [ 21372: 21377] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.529625 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.529943 678849 task_exit.go:204] [ 21372: 21372] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.533062 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x127080, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:02.533564 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.537290 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.537527 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.540114 678849 usertrap_amd64.go:212] [ 21376: 21376] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.540336 678849 usertrap_amd64.go:122] [ 21376: 21376] Allocate a new trap: 0xc0007f2870 38 D0307 12:03:02.540838 678849 usertrap_amd64.go:225] [ 21376: 21376] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.544285 678849 usertrap_amd64.go:212] [ 21376: 21376] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.544350 678849 usertrap_amd64.go:122] [ 21376: 21376] Allocate a new trap: 0xc0007f2870 39 D0307 12:03:02.544432 678849 usertrap_amd64.go:225] [ 21376: 21376] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.546487 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.546767 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.561576 678849 usertrap_amd64.go:212] [ 21378: 21378] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.561671 678849 usertrap_amd64.go:122] [ 21378: 21378] Allocate a new trap: 0xc009cacf00 38 D0307 12:03:02.561960 678849 usertrap_amd64.go:225] [ 21378: 21378] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.565705 678849 usertrap_amd64.go:212] [ 21378: 21378] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.565780 678849 usertrap_amd64.go:122] [ 21378: 21378] Allocate a new trap: 0xc009cacf00 39 D0307 12:03:02.565842 678849 usertrap_amd64.go:225] [ 21378: 21378] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.568183 678849 usertrap_amd64.go:212] [ 21380: 21380] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.568302 678849 usertrap_amd64.go:122] [ 21380: 21380] Allocate a new trap: 0xc0009295c0 38 D0307 12:03:02.568357 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.568759 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.568841 678849 usertrap_amd64.go:225] [ 21380: 21380] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.570540 678849 usertrap_amd64.go:212] [ 21380: 21380] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.570606 678849 usertrap_amd64.go:122] [ 21380: 21380] Allocate a new trap: 0xc0009295c0 39 D0307 12:03:02.570719 678849 usertrap_amd64.go:225] [ 21380: 21380] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.573479 678849 usertrap_amd64.go:212] [ 21376: 21376] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.573633 678849 usertrap_amd64.go:122] [ 21376: 21376] Allocate a new trap: 0xc0007f2870 40 D0307 12:03:02.573870 678849 usertrap_amd64.go:225] [ 21376: 21376] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.574069 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.574392 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.581673 678849 task_exit.go:204] [ 21376: 21376] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.582088 678849 task_signals.go:204] [ 21376: 21381] Signal 21376, PID: 21381, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.582111 678849 task_exit.go:204] [ 21376: 21376] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.582177 678849 task_exit.go:204] [ 21376: 21381] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.584014 678849 task_exit.go:204] [ 21376: 21381] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.584058 678849 task_exit.go:204] [ 21376: 21381] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.584130 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.584578 678849 task_exit.go:204] [ 21376: 21376] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 1: lsetxattr$smack_xattr_label(0x0, &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.593528 678849 usertrap_amd64.go:212] [ 21379: 21379] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.593700 678849 usertrap_amd64.go:122] [ 21379: 21379] Allocate a new trap: 0xc006128e40 38 D0307 12:03:02.594052 678849 usertrap_amd64.go:225] [ 21379: 21379] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.597361 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.597770 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.600078 678849 usertrap_amd64.go:212] [ 21379: 21379] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.600187 678849 usertrap_amd64.go:122] [ 21379: 21379] Allocate a new trap: 0xc006128e40 39 D0307 12:03:02.600311 678849 usertrap_amd64.go:225] [ 21379: 21379] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.602445 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.604019 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.604543 678849 usertrap_amd64.go:212] [ 21378: 21378] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.604751 678849 usertrap_amd64.go:122] [ 21378: 21378] Allocate a new trap: 0xc009cacf00 40 D0307 12:03:02.604984 678849 usertrap_amd64.go:225] [ 21378: 21378] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.607926 678849 task_exit.go:204] [ 21378: 21378] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.608136 678849 task_exit.go:204] [ 21378: 21378] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.609264 678849 task_signals.go:204] [ 21378: 21382] Signal 21378, PID: 21382, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.609369 678849 task_signals.go:204] [ 21378: 21383] Signal 21378, PID: 21383, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.609436 678849 task_exit.go:204] [ 21378: 21382] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.609690 678849 task_exit.go:204] [ 21378: 21382] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.609771 678849 task_exit.go:204] [ 21378: 21382] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.610281 678849 task_exit.go:204] [ 21378: 21383] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.612572 678849 task_exit.go:204] [ 21378: 21383] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.612650 678849 task_exit.go:204] [ 21378: 21383] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.612748 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.613000 678849 task_exit.go:204] [ 21378: 21378] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 0: r0 = add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c9a546122af2eecd776a3edb529a202d6abae2328bbfb82ed2f68b2fa67d20dc57083a17e860fd8d96935777e114004b1814257c4b3d7f80b765b4abe47ce12b2a8e488f1d1646bd7d95e054d0cdaf73b58f4cfcef1ac7c9b52ed0faf9f8cf8a232b7ef4f7", 0x65, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d990875b292bfcffd8d7bc5e518bf5a2b8dff3ec76041f3684147b1e1a9975c6ec318595250695381628a256e7b3e58d2285a4047e2fbb0db5e1029a209dc77d", 0x36}, 0x48, r0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='%\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r1, 0x0) D0307 12:03:02.624397 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.624831 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.634947 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.635102 678849 usertrap_amd64.go:212] [ 21385: 21385] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.635215 678849 usertrap_amd64.go:122] [ 21385: 21385] Allocate a new trap: 0xc007186a50 38 D0307 12:03:02.635653 678849 usertrap_amd64.go:225] [ 21385: 21385] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.635794 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.636536 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.637024 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.639170 678849 usertrap_amd64.go:212] [ 21385: 21385] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.639289 678849 usertrap_amd64.go:122] [ 21385: 21385] Allocate a new trap: 0xc007186a50 39 D0307 12:03:02.639376 678849 usertrap_amd64.go:225] [ 21385: 21385] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.639753 678849 usertrap_amd64.go:212] [ 21380: 21380] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.639881 678849 usertrap_amd64.go:122] [ 21380: 21380] Allocate a new trap: 0xc0009295c0 40 D0307 12:03:02.639991 678849 usertrap_amd64.go:225] [ 21380: 21380] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.642085 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.642380 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.642569 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.642995 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.652233 678849 usertrap_amd64.go:212] [ 21379: 21379] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.652380 678849 usertrap_amd64.go:122] [ 21379: 21379] Allocate a new trap: 0xc006128e40 40 D0307 12:03:02.652503 678849 usertrap_amd64.go:225] [ 21379: 21379] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.655901 678849 task_exit.go:204] [ 21379: 21379] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.656224 678849 usertrap_amd64.go:212] [ 21387: 21387] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.656451 678849 usertrap_amd64.go:122] [ 21387: 21387] Allocate a new trap: 0xc00037f830 38 D0307 12:03:02.656559 678849 task_exit.go:204] [ 21379: 21379] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.656805 678849 task_signals.go:204] [ 21379: 21386] Signal 21379, PID: 21386, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.656979 678849 task_exit.go:204] [ 21379: 21386] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.657034 678849 usertrap_amd64.go:225] [ 21387: 21387] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.661446 678849 task_exit.go:204] [ 21379: 21386] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.661531 678849 task_exit.go:204] [ 21379: 21386] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.661639 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.662669 678849 task_exit.go:204] [ 21379: 21379] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) write$P9_RSTATu(r2, &(0x7f00000000c0)={0x5a, 0x7d, 0x2, {{0x0, 0x45, 0xfffe, 0x4, {0x4, 0x1, 0x3}, 0x44000000, 0x4, 0x5, 0x2, 0x5, '-\\\'$\xc5', 0x1, '.', 0xa, '/dev/zero\x00', 0x2, '&,'}, 0x0, '', 0xffffffffffffffff, 0x0, r3}}, 0x5a) D0307 12:03:02.665857 678849 task_exit.go:204] [ 21380: 21380] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.666332 678849 task_exit.go:204] [ 21380: 21380] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.667521 678849 task_signals.go:204] [ 21380: 21384] Signal 21380, PID: 21384, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.667620 678849 task_exit.go:204] [ 21380: 21384] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.670749 678849 task_exit.go:204] [ 21380: 21384] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.670811 678849 task_exit.go:204] [ 21380: 21384] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.670881 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.671939 678849 task_exit.go:204] [ 21380: 21380] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.675139 678849 usertrap_amd64.go:212] [ 21385: 21385] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.675289 678849 usertrap_amd64.go:122] [ 21385: 21385] Allocate a new trap: 0xc007186a50 40 D0307 12:03:02.675384 678849 usertrap_amd64.go:225] [ 21385: 21385] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x8000, 0xfffffffd, 0x1, {{0x13, 0x4, 0x3, 0x6, 0x4c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast1, @remote, {[@timestamp={0x44, 0x28, 0xe1, 0x0, 0x8, [0x82c6, 0x3f, 0x8020, 0x7fff, 0x401, 0x9, 0x100, 0x5, 0x7]}, @lsrr={0x83, 0xf, 0x1f, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x40}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x1, 0x1, 0x10, @remote, @remote, 0x10, 0x7808, 0x0, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000240)={'gretap0\x00', r4, 0x1, 0x10, 0x9, 0x0, {{0x2d, 0x4, 0x0, 0x37, 0xb4, 0x64, 0x0, 0x2, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp_prespec={0x44, 0x3c, 0x84, 0x3, 0x6, [{@rand_addr=0x64010100, 0x7}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x7ff}, {@broadcast, 0x20}, {@private=0xa010102, 0x4}, {@rand_addr=0x64010102, 0x3}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x4}]}, @ssrr={0x89, 0x23, 0x76, [@remote, @multicast1, @private=0xa010101, @remote, @private=0xa010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3d}]}, @noop, @timestamp_addr={0x44, 0x3c, 0x24, 0x1, 0x7, [{@multicast1, 0x2}, {@broadcast, 0xfffffff8}, {@empty, 0x2}, {@empty, 0xfffffffe}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@multicast2, 0x81}, {@multicast1, 0x400}]}, @end]}}}}}) D0307 12:03:02.679345 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.679805 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.681136 678849 task_exit.go:204] [ 21385: 21385] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.681400 678849 task_exit.go:204] [ 21385: 21385] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.681578 678849 usertrap_amd64.go:212] [ 21387: 21387] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.681655 678849 usertrap_amd64.go:122] [ 21387: 21387] Allocate a new trap: 0xc00037f830 39 D0307 12:03:02.681756 678849 usertrap_amd64.go:225] [ 21387: 21387] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.682162 678849 task_signals.go:204] [ 21385: 21388] Signal 21385, PID: 21388, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.682250 678849 task_exit.go:204] [ 21385: 21388] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.687226 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.687566 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.688388 678849 task_exit.go:204] [ 21385: 21388] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.688515 678849 task_exit.go:204] [ 21385: 21388] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.688675 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.690221 678849 task_exit.go:204] [ 21385: 21385] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.694456 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} 12:03:02 executing program 1: lsetxattr$smack_xattr_label(0x0, 0x0, &(0x7f0000000200)={']\'#-'}, 0x5, 0xbb8d34227e001f81) D0307 12:03:02.694907 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.701540 678849 usertrap_amd64.go:212] [ 21389: 21389] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.701762 678849 usertrap_amd64.go:122] [ 21389: 21389] Allocate a new trap: 0xc00732b590 38 D0307 12:03:02.702244 678849 usertrap_amd64.go:225] [ 21389: 21389] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.703908 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.704421 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.704839 678849 usertrap_amd64.go:212] [ 21389: 21389] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.704985 678849 usertrap_amd64.go:122] [ 21389: 21389] Allocate a new trap: 0xc00732b590 39 D0307 12:03:02.705124 678849 usertrap_amd64.go:225] [ 21389: 21389] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.706916 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.711336 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.748848 678849 usertrap_amd64.go:212] [ 21390: 21390] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.749052 678849 usertrap_amd64.go:122] [ 21390: 21390] Allocate a new trap: 0xc0007f2ab0 38 D0307 12:03:02.753476 678849 usertrap_amd64.go:225] [ 21390: 21390] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.754529 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.754862 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.755646 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.755983 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.757967 678849 usertrap_amd64.go:212] [ 21390: 21390] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.758168 678849 usertrap_amd64.go:122] [ 21390: 21390] Allocate a new trap: 0xc0007f2ab0 39 D0307 12:03:02.758567 678849 usertrap_amd64.go:225] [ 21390: 21390] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.758781 678849 usertrap_amd64.go:212] [ 21389: 21389] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.758996 678849 usertrap_amd64.go:122] [ 21389: 21389] Allocate a new trap: 0xc00732b590 40 D0307 12:03:02.759216 678849 usertrap_amd64.go:225] [ 21389: 21389] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.761116 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.761785 678849 task_exit.go:204] [ 21389: 21389] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.761772 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.762116 678849 task_signals.go:204] [ 21389: 21394] Signal 21389, PID: 21394, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.762221 678849 task_exit.go:204] [ 21389: 21394] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.762430 678849 task_exit.go:204] [ 21389: 21389] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.764209 678849 task_exit.go:204] [ 21389: 21394] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.764267 678849 task_exit.go:204] [ 21389: 21394] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.764335 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.765145 678849 task_exit.go:204] [ 21389: 21389] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.765722 678849 usertrap_amd64.go:212] [ 21392: 21392] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.765830 678849 usertrap_amd64.go:122] [ 21392: 21392] Allocate a new trap: 0xc000599710 38 D0307 12:03:02.766248 678849 usertrap_amd64.go:225] [ 21392: 21392] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.769534 678849 usertrap_amd64.go:212] [ 21392: 21392] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.769692 678849 usertrap_amd64.go:122] [ 21392: 21392] Allocate a new trap: 0xc000599710 39 D0307 12:03:02.769783 678849 usertrap_amd64.go:225] [ 21392: 21392] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r3 = getuid() setresuid(0xffffffffffffffff, 0x0, r3) D0307 12:03:02.772106 678849 usertrap_amd64.go:212] [ 21387: 21387] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.772210 678849 usertrap_amd64.go:122] [ 21387: 21387] Allocate a new trap: 0xc00037f830 40 D0307 12:03:02.772341 678849 usertrap_amd64.go:225] [ 21387: 21387] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.775317 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.775926 678849 task_exit.go:204] [ 21387: 21387] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.776142 678849 task_signals.go:204] [ 21387: 21391] Signal 21387, PID: 21391, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.776185 678849 task_signals.go:204] [ 21387: 21393] Signal 21387, PID: 21393, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.776209 678849 task_exit.go:204] [ 21387: 21387] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.776355 678849 task_exit.go:204] [ 21387: 21391] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.776540 678849 task_exit.go:204] [ 21387: 21393] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.776799 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.777407 678849 task_exit.go:204] [ 21387: 21391] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.777467 678849 task_exit.go:204] [ 21387: 21391] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.778076 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.778345 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.778500 678849 task_exit.go:204] [ 21387: 21393] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.778562 678849 task_exit.go:204] [ 21387: 21393] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.778649 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.781928 678849 task_exit.go:204] [ 21387: 21387] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) D0307 12:03:02.786741 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.787141 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.789998 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.791676 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.801395 678849 usertrap_amd64.go:212] [ 21390: 21390] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.801495 678849 usertrap_amd64.go:122] [ 21390: 21390] Allocate a new trap: 0xc0007f2ab0 40 D0307 12:03:02.801572 678849 usertrap_amd64.go:225] [ 21390: 21390] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.804005 678849 task_exit.go:204] [ 21390: 21390] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.804280 678849 task_signals.go:204] [ 21390: 21395] Signal 21390, PID: 21395, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.804399 678849 task_exit.go:204] [ 21390: 21395] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.804655 678849 task_exit.go:204] [ 21390: 21390] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.806962 678849 task_exit.go:204] [ 21390: 21395] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.807134 678849 task_exit.go:204] [ 21390: 21395] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.807292 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.809692 678849 task_exit.go:204] [ 21390: 21390] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x8000, 0xfffffffd, 0x1, {{0x13, 0x4, 0x3, 0x6, 0x4c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast1, @remote, {[@timestamp={0x44, 0x28, 0xe1, 0x0, 0x8, [0x82c6, 0x3f, 0x8020, 0x7fff, 0x401, 0x9, 0x100, 0x5, 0x7]}, @lsrr={0x83, 0xf, 0x1f, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x40}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x1, 0x1, 0x10, @remote, @remote, 0x10, 0x7808, 0x0, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000240)={'gretap0\x00', r4, 0x1, 0x10, 0x9, 0x0, {{0x2d, 0x4, 0x0, 0x37, 0xb4, 0x64, 0x0, 0x2, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp_prespec={0x44, 0x3c, 0x84, 0x3, 0x6, [{@rand_addr=0x64010100, 0x7}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x7ff}, {@broadcast, 0x20}, {@private=0xa010102, 0x4}, {@rand_addr=0x64010102, 0x3}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x4}]}, @ssrr={0x89, 0x23, 0x76, [@remote, @multicast1, @private=0xa010101, @remote, @private=0xa010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3d}]}, @noop, @timestamp_addr={0x44, 0x3c, 0x24, 0x1, 0x7, [{@multicast1, 0x2}, {@broadcast, 0xfffffff8}, {@empty, 0x2}, {@empty, 0xfffffffe}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@multicast2, 0x81}, {@multicast1, 0x400}]}, @end]}}}}}) D0307 12:03:02.818385 678849 usertrap_amd64.go:212] [ 21392: 21392] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.818514 678849 usertrap_amd64.go:122] [ 21392: 21392] Allocate a new trap: 0xc000599710 40 D0307 12:03:02.819106 678849 usertrap_amd64.go:225] [ 21392: 21392] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.821845 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.822281 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.823929 678849 task_exit.go:204] [ 21392: 21392] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.824279 678849 task_exit.go:204] [ 21392: 21392] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.824494 678849 task_signals.go:204] [ 21392: 21398] Signal 21392, PID: 21398, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.824653 678849 task_exit.go:204] [ 21392: 21398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.825698 678849 usertrap_amd64.go:212] [ 21397: 21397] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.825806 678849 usertrap_amd64.go:122] [ 21397: 21397] Allocate a new trap: 0xc009cb2330 38 D0307 12:03:02.826909 678849 task_exit.go:204] [ 21392: 21398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.826970 678849 task_exit.go:204] [ 21392: 21398] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.827039 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.827187 678849 task_exit.go:204] [ 21392: 21392] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.829134 678849 usertrap_amd64.go:225] [ 21397: 21397] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.834471 678849 usertrap_amd64.go:212] [ 21397: 21397] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.834545 678849 usertrap_amd64.go:122] [ 21397: 21397] Allocate a new trap: 0xc009cb2330 39 D0307 12:03:02.834631 678849 usertrap_amd64.go:225] [ 21397: 21397] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) 12:03:02 executing program 1: lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0xbb8d34227e001f81) D0307 12:03:02.835672 678849 usertrap_amd64.go:212] [ 21396: 21396] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.835744 678849 usertrap_amd64.go:122] [ 21396: 21396] Allocate a new trap: 0xc000599740 38 D0307 12:03:02.836060 678849 usertrap_amd64.go:225] [ 21396: 21396] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.838345 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.838815 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.839875 678849 usertrap_amd64.go:212] [ 21396: 21396] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.839958 678849 usertrap_amd64.go:122] [ 21396: 21396] Allocate a new trap: 0xc000599740 39 D0307 12:03:02.840038 678849 usertrap_amd64.go:225] [ 21396: 21396] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.846748 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.847135 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.861480 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.862681 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.863998 678849 usertrap_amd64.go:212] [ 21399: 21399] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:02.864146 678849 usertrap_amd64.go:122] [ 21399: 21399] Allocate a new trap: 0xc001fa1110 38 D0307 12:03:02.864543 678849 usertrap_amd64.go:225] [ 21399: 21399] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:02.867442 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.867857 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.870617 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.870837 678849 usertrap_amd64.go:212] [ 21399: 21399] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:02.871116 678849 usertrap_amd64.go:122] [ 21399: 21399] Allocate a new trap: 0xc001fa1110 39 D0307 12:03:02.871283 678849 usertrap_amd64.go:225] [ 21399: 21399] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:02.871206 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.873675 678849 usertrap_amd64.go:212] [ 21397: 21397] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:02.873768 678849 usertrap_amd64.go:122] [ 21397: 21397] Allocate a new trap: 0xc009cb2330 40 D0307 12:03:02.873865 678849 usertrap_amd64.go:225] [ 21397: 21397] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:02.877927 678849 usertrap_amd64.go:212] [ 21401: 21401] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.878079 678849 usertrap_amd64.go:122] [ 21401: 21401] Allocate a new trap: 0xc006bd9170 38 D0307 12:03:02.878509 678849 usertrap_amd64.go:225] [ 21401: 21401] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:02.881305 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.881656 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.882560 678849 task_exit.go:204] [ 21397: 21397] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.882842 678849 task_signals.go:204] [ 21397: 21400] Signal 21397, PID: 21400, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.882999 678849 task_exit.go:204] [ 21397: 21400] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.883212 678849 task_exit.go:204] [ 21397: 21397] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.885117 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.885679 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.887182 678849 task_exit.go:204] [ 21397: 21400] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.887271 678849 task_exit.go:204] [ 21397: 21400] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.887350 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:02.887516 678849 task_exit.go:204] [ 21397: 21397] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.887839 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:02 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) (async) D0307 12:03:02.889608 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.892472 678849 usertrap_amd64.go:212] [ 21396: 21396] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:02.892563 678849 usertrap_amd64.go:122] [ 21396: 21396] Allocate a new trap: 0xc000599740 40 D0307 12:03:02.892702 678849 usertrap_amd64.go:225] [ 21396: 21396] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:02.893558 678849 usertrap_amd64.go:212] [ 21401: 21401] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:02.893619 678849 usertrap_amd64.go:122] [ 21401: 21401] Allocate a new trap: 0xc006bd9170 39 D0307 12:03:02.893703 678849 usertrap_amd64.go:225] [ 21401: 21401] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:02.894095 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.894395 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.895601 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.895892 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.898123 678849 task_exit.go:204] [ 21396: 21396] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.898365 678849 task_exit.go:204] [ 21396: 21396] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.898543 678849 task_signals.go:204] [ 21396: 21402] Signal 21396, PID: 21402, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.898816 678849 task_exit.go:204] [ 21396: 21402] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.903532 678849 task_exit.go:204] [ 21396: 21402] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.903623 678849 task_exit.go:204] [ 21396: 21402] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.903711 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:02.904159 678849 task_exit.go:204] [ 21396: 21396] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) getuid() D0307 12:03:02.911857 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.912206 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.912594 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.913025 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.931368 678849 usertrap_amd64.go:212] [ 21401: 21401] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:02.931486 678849 usertrap_amd64.go:122] [ 21401: 21401] Allocate a new trap: 0xc006bd9170 40 D0307 12:03:02.931575 678849 usertrap_amd64.go:225] [ 21401: 21401] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:02.935764 678849 usertrap_amd64.go:212] [ 21399: 21399] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:02.935825 678849 usertrap_amd64.go:122] [ 21399: 21399] Allocate a new trap: 0xc001fa1110 40 D0307 12:03:02.935886 678849 usertrap_amd64.go:225] [ 21399: 21399] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:02.938697 678849 task_exit.go:204] [ 21401: 21401] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.938986 678849 task_exit.go:204] [ 21401: 21401] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.939391 678849 task_signals.go:204] [ 21401: 21407] Signal 21401, PID: 21407, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.939520 678849 task_exit.go:204] [ 21401: 21407] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.941336 678849 task_exit.go:204] [ 21401: 21407] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.941474 678849 task_exit.go:204] [ 21401: 21407] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.941561 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:02.941650 678849 task_exit.go:204] [ 21401: 21401] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.944620 678849 task_exit.go:204] [ 21399: 21399] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.944808 678849 task_exit.go:204] [ 21399: 21399] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.944911 678849 task_signals.go:204] [ 21399: 21404] Signal 21399, PID: 21404, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.945089 678849 task_signals.go:204] [ 21399: 21403] Signal 21399, PID: 21403, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.945164 678849 task_exit.go:204] [ 21399: 21404] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.945291 678849 task_exit.go:204] [ 21399: 21403] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:02.945501 678849 task_exit.go:204] [ 21399: 21403] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.945584 678849 task_exit.go:204] [ 21399: 21403] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.945821 678849 task_exit.go:204] [ 21399: 21404] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.945894 678849 task_exit.go:204] [ 21399: 21404] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.948252 678849 task_signals.go:204] [ 21399: 21405] Signal 21399, PID: 21405, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:02.948376 678849 task_exit.go:204] [ 21399: 21405] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:02 executing program 1: lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x0) D0307 12:03:02.950435 678849 task_exit.go:204] [ 21399: 21405] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:02.950500 678849 task_exit.go:204] [ 21399: 21405] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:02.950645 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:02.951662 678849 task_exit.go:204] [ 21399: 21399] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) (rerun: 64) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x8000, 0xfffffffd, 0x1, {{0x13, 0x4, 0x3, 0x6, 0x4c, 0x68, 0x0, 0x3, 0x29, 0x0, @multicast1, @remote, {[@timestamp={0x44, 0x28, 0xe1, 0x0, 0x8, [0x82c6, 0x3f, 0x8020, 0x7fff, 0x401, 0x9, 0x100, 0x5, 0x7]}, @lsrr={0x83, 0xf, 0x1f, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x40}]}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x1, 0x1, 0x10, @remote, @remote, 0x10, 0x7808, 0x0, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000240)={'gretap0\x00', r4, 0x1, 0x10, 0x9, 0x0, {{0x2d, 0x4, 0x0, 0x37, 0xb4, 0x64, 0x0, 0x2, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp_prespec={0x44, 0x3c, 0x84, 0x3, 0x6, [{@rand_addr=0x64010100, 0x7}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x7ff}, {@broadcast, 0x20}, {@private=0xa010102, 0x4}, {@rand_addr=0x64010102, 0x3}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x4}]}, @ssrr={0x89, 0x23, 0x76, [@remote, @multicast1, @private=0xa010101, @remote, @private=0xa010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3d}]}, @noop, @timestamp_addr={0x44, 0x3c, 0x24, 0x1, 0x7, [{@multicast1, 0x2}, {@broadcast, 0xfffffff8}, {@empty, 0x2}, {@empty, 0xfffffffe}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@multicast2, 0x81}, {@multicast1, 0x400}]}, @end]}}}}}) D0307 12:03:02.957358 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.958508 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.963794 678849 usertrap_amd64.go:212] [ 21406: 21406] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:02.963912 678849 usertrap_amd64.go:122] [ 21406: 21406] Allocate a new trap: 0xc00037fa70 38 D0307 12:03:02.964298 678849 usertrap_amd64.go:225] [ 21406: 21406] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:02.968228 678849 usertrap_amd64.go:212] [ 21406: 21406] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:02.968357 678849 usertrap_amd64.go:122] [ 21406: 21406] Allocate a new trap: 0xc00037fa70 39 D0307 12:03:02.968429 678849 usertrap_amd64.go:225] [ 21406: 21406] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:02.978100 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:02.978447 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.978679 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.978916 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.979986 678849 usertrap_amd64.go:212] [ 21408: 21408] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:02.980099 678849 usertrap_amd64.go:122] [ 21408: 21408] Allocate a new trap: 0xc00037fad0 38 D0307 12:03:02.980861 678849 usertrap_amd64.go:225] [ 21408: 21408] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:02.990209 678849 usertrap_amd64.go:212] [ 21408: 21408] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:02.990255 678849 usertrap_amd64.go:122] [ 21408: 21408] Allocate a new trap: 0xc00037fad0 39 D0307 12:03:02.990325 678849 usertrap_amd64.go:225] [ 21408: 21408] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:02.994682 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:02.995023 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:02.999763 678849 usertrap_amd64.go:212] [ 21409: 21409] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:02.999874 678849 usertrap_amd64.go:122] [ 21409: 21409] Allocate a new trap: 0xc007186d20 38 D0307 12:03:03.000174 678849 usertrap_amd64.go:225] [ 21409: 21409] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.008899 678849 usertrap_amd64.go:212] [ 21409: 21409] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.009042 678849 usertrap_amd64.go:122] [ 21409: 21409] Allocate a new trap: 0xc007186d20 39 D0307 12:03:03.009104 678849 usertrap_amd64.go:225] [ 21409: 21409] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.009156 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.009562 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.011364 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.011592 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.011929 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.012212 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.022235 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.024077 678849 usertrap_amd64.go:212] [ 21410: 21410] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.024298 678849 usertrap_amd64.go:122] [ 21410: 21410] Allocate a new trap: 0xc00853ac30 38 D0307 12:03:03.024079 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.024709 678849 usertrap_amd64.go:225] [ 21410: 21410] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.034772 678849 usertrap_amd64.go:212] [ 21410: 21410] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.034840 678849 usertrap_amd64.go:122] [ 21410: 21410] Allocate a new trap: 0xc00853ac30 39 D0307 12:03:03.034908 678849 usertrap_amd64.go:225] [ 21410: 21410] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.036156 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.036489 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.037298 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.042549 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.055177 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.055510 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.056794 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.057008 678849 usertrap_amd64.go:212] [ 21409: 21409] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.057087 678849 usertrap_amd64.go:122] [ 21409: 21409] Allocate a new trap: 0xc007186d20 40 D0307 12:03:03.057180 678849 usertrap_amd64.go:225] [ 21409: 21409] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.057163 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.060245 678849 task_exit.go:204] [ 21409: 21409] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.060836 678849 task_signals.go:204] [ 21409: 21415] Signal 21409, PID: 21415, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.061020 678849 task_exit.go:204] [ 21409: 21409] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.061150 678849 usertrap_amd64.go:212] [ 21408: 21408] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.061204 678849 usertrap_amd64.go:122] [ 21408: 21408] Allocate a new trap: 0xc00037fad0 40 D0307 12:03:03.061284 678849 usertrap_amd64.go:225] [ 21408: 21408] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.061393 678849 task_exit.go:204] [ 21409: 21415] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.062993 678849 task_exit.go:204] [ 21409: 21415] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.063050 678849 task_exit.go:204] [ 21409: 21415] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.063165 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.063266 678849 task_exit.go:204] [ 21409: 21409] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 1: lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x0) D0307 12:03:03.069993 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.070257 678849 task_exit.go:204] [ 21408: 21408] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.070380 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.070482 678849 task_exit.go:204] [ 21408: 21408] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.070563 678849 task_signals.go:204] [ 21408: 21413] Signal 21408, PID: 21413, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.070645 678849 task_exit.go:204] [ 21408: 21413] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.070906 678849 usertrap_amd64.go:212] [ 21406: 21406] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:03.071004 678849 usertrap_amd64.go:122] [ 21406: 21406] Allocate a new trap: 0xc00037fa70 40 D0307 12:03:03.071090 678849 usertrap_amd64.go:225] [ 21406: 21406] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.072584 678849 task_exit.go:204] [ 21408: 21413] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.072665 678849 task_exit.go:204] [ 21408: 21413] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.072746 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.077288 678849 task_exit.go:204] [ 21408: 21408] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) D0307 12:03:03.091159 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.094590 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.102052 678849 usertrap_amd64.go:212] [ 21406: 21406] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.102115 678849 usertrap_amd64.go:122] [ 21406: 21406] Allocate a new trap: 0xc00037fa70 41 D0307 12:03:03.102181 678849 usertrap_amd64.go:225] [ 21406: 21406] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:03.105311 678849 task_exit.go:204] [ 21406: 21406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.105423 678849 task_signals.go:204] [ 21406: 21412] Signal 21406, PID: 21412, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.105308 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.105502 678849 task_exit.go:204] [ 21406: 21412] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.105690 678849 task_signals.go:204] [ 21406: 21414] Signal 21406, PID: 21414, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.105809 678849 task_signals.go:204] [ 21406: 21416] Signal 21406, PID: 21416, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.106019 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.106094 678849 task_exit.go:204] [ 21406: 21412] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.105996 678849 task_signals.go:204] [ 21406: 21411] Signal 21406, PID: 21411, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.106186 678849 task_exit.go:204] [ 21406: 21412] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.106373 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.106486 678849 task_exit.go:204] [ 21406: 21414] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.108638 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.108858 678849 task_exit.go:204] [ 21406: 21416] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.109012 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.109101 678849 task_exit.go:204] [ 21406: 21411] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.109336 678849 task_exit.go:204] [ 21406: 21406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.109183 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.109762 678849 task_exit.go:204] [ 21406: 21414] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.109823 678849 task_exit.go:204] [ 21406: 21414] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.109804 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.109994 678849 task_exit.go:204] [ 21406: 21411] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.110061 678849 task_exit.go:204] [ 21406: 21411] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.110802 678849 usertrap_amd64.go:212] [ 21419: 21419] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.110894 678849 usertrap_amd64.go:122] [ 21419: 21419] Allocate a new trap: 0xc00853acf0 38 D0307 12:03:03.111250 678849 usertrap_amd64.go:225] [ 21419: 21419] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.114074 678849 usertrap_amd64.go:212] [ 21419: 21419] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.114139 678849 usertrap_amd64.go:122] [ 21419: 21419] Allocate a new trap: 0xc00853acf0 39 D0307 12:03:03.114267 678849 usertrap_amd64.go:225] [ 21419: 21419] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.114868 678849 task_exit.go:204] [ 21406: 21416] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.115007 678849 task_exit.go:204] [ 21406: 21416] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.115127 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.115478 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.115603 678849 task_exit.go:204] [ 21406: 21406] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.115932 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.116175 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.116518 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.116799 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.117222 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.117499 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.117821 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.120316 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.120521 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.120935 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.121125 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.121420 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.122440 678849 usertrap_amd64.go:212] [ 21420: 21420] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.122541 678849 usertrap_amd64.go:122] [ 21420: 21420] Allocate a new trap: 0xc0061294d0 38 D0307 12:03:03.122608 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.122857 678849 usertrap_amd64.go:225] [ 21420: 21420] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.122965 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.123401 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.123666 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.124049 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.124393 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.124744 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.124861 678849 usertrap_amd64.go:212] [ 21420: 21420] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.124923 678849 usertrap_amd64.go:122] [ 21420: 21420] Allocate a new trap: 0xc0061294d0 39 D0307 12:03:03.125010 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.125039 678849 usertrap_amd64.go:225] [ 21420: 21420] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.125311 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.125579 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.125602 678849 usertrap_amd64.go:212] [ 21410: 21410] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:03.125690 678849 usertrap_amd64.go:122] [ 21410: 21410] Allocate a new trap: 0xc00853ac30 40 D0307 12:03:03.125780 678849 usertrap_amd64.go:225] [ 21410: 21410] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.125893 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.126240 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:03 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) D0307 12:03:03.128449 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.128750 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.129168 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.129618 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.129787 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.130060 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.130195 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.134625 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.135251 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.136494 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.137018 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.137424 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.137748 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.138104 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.138401 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.138702 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.139079 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.139589 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.140142 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.140437 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.140816 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.141700 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.142023 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.142894 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.143292 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.146950 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.147324 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.147586 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.148368 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.148666 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.149041 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.149927 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.150500 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.150852 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.151239 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.151596 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.151992 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.153061 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.153462 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.153687 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.154179 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.154486 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.154835 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.154943 678849 usertrap_amd64.go:212] [ 21419: 21419] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.155081 678849 usertrap_amd64.go:122] [ 21419: 21419] Allocate a new trap: 0xc00853acf0 40 D0307 12:03:03.155187 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.155208 678849 usertrap_amd64.go:225] [ 21419: 21419] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.155546 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.155827 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.155931 678849 usertrap_amd64.go:212] [ 21422: 21422] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.156023 678849 usertrap_amd64.go:122] [ 21422: 21422] Allocate a new trap: 0xc00037fd70 38 D0307 12:03:03.156078 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.156371 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.156538 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.156798 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.157102 678849 usertrap_amd64.go:225] [ 21422: 21422] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.157154 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.157341 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.157575 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.157779 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.157962 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.158194 678849 task_exit.go:204] [ 21419: 21419] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.158235 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.158330 678849 task_signals.go:204] [ 21419: 21424] Signal 21419, PID: 21424, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.158483 678849 task_exit.go:204] [ 21419: 21424] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.158546 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.158799 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.159240 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.159546 678849 task_exit.go:204] [ 21419: 21419] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.159713 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.160174 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.160402 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.160698 678849 usertrap_amd64.go:212] [ 21420: 21420] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.160762 678849 usertrap_amd64.go:122] [ 21420: 21420] Allocate a new trap: 0xc0061294d0 40 D0307 12:03:03.160823 678849 usertrap_amd64.go:225] [ 21420: 21420] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.160699 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.161481 678849 task_exit.go:204] [ 21419: 21424] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.161544 678849 task_exit.go:204] [ 21419: 21424] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.161650 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.161859 678849 task_exit.go:204] [ 21419: 21419] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 1: lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x0) D0307 12:03:03.165368 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.165937 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.166206 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.166836 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.167111 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.167449 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.168475 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.168767 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.169235 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.169906 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.170233 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.170608 678849 usertrap_amd64.go:212] [ 21422: 21422] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.170701 678849 usertrap_amd64.go:122] [ 21422: 21422] Allocate a new trap: 0xc00037fd70 39 D0307 12:03:03.170662 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.170788 678849 usertrap_amd64.go:225] [ 21422: 21422] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:03.170796 678849 task_exit.go:204] [ 21420: 21420] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.171030 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.171057 678849 task_signals.go:204] [ 21420: 21423] Signal 21420, PID: 21423, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.171113 678849 task_exit.go:204] [ 21420: 21420] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.171772 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.171883 678849 task_exit.go:204] [ 21420: 21423] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.173840 678849 task_exit.go:204] [ 21420: 21423] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.173910 678849 task_exit.go:204] [ 21420: 21423] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.174041 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.175369 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.175473 678849 task_exit.go:204] [ 21420: 21420] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.175700 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.176427 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.176809 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.179340 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.179480 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.179702 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.181039 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.181318 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.181632 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.181872 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.182207 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.182395 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.182653 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.182898 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.183163 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.183359 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.183618 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.183823 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.184185 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.184524 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.184743 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.185052 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.185301 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.185600 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.185965 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.186239 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.186519 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.186866 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.187071 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.187376 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.187859 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.188109 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.188444 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.188688 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.188934 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.189209 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.201131 678849 usertrap_amd64.go:212] [ 21410: 21410] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.201204 678849 usertrap_amd64.go:122] [ 21410: 21410] Allocate a new trap: 0xc00853ac30 41 D0307 12:03:03.201270 678849 usertrap_amd64.go:225] [ 21410: 21410] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:03.208469 678849 task_exit.go:204] [ 21410: 21410] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.208746 678849 task_exit.go:204] [ 21410: 21410] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.209194 678849 task_signals.go:204] [ 21410: 21417] Signal 21410, PID: 21417, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.209832 678849 task_exit.go:204] [ 21410: 21417] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.210071 678849 task_exit.go:204] [ 21410: 21417] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.210202 678849 task_exit.go:204] [ 21410: 21417] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.210375 678849 task_signals.go:204] [ 21410: 21421] Signal 21410, PID: 21421, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.210483 678849 task_exit.go:204] [ 21410: 21421] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.210614 678849 task_signals.go:204] [ 21410: 21418] Signal 21410, PID: 21418, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.210742 678849 task_exit.go:204] [ 21410: 21421] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.210784 678849 task_exit.go:204] [ 21410: 21421] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.212026 678849 task_exit.go:204] [ 21410: 21418] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.215596 678849 task_exit.go:204] [ 21410: 21418] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.215693 678849 task_exit.go:204] [ 21410: 21418] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.215778 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.216339 678849 task_exit.go:204] [ 21410: 21410] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "336ae39145ab5b49", "aa6392cae04b43c40775e3153514c3c2", "da9045fa", "b1538825d0aa1b79"}, 0x28) r1 = semget(0x0, 0x4, 0x80) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000040)=""/40) D0307 12:03:03.220525 678849 usertrap_amd64.go:212] [ 21426: 21426] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.220636 678849 usertrap_amd64.go:122] [ 21426: 21426] Allocate a new trap: 0xc006bd95c0 38 D0307 12:03:03.221005 678849 usertrap_amd64.go:225] [ 21426: 21426] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.223471 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.223896 678849 usertrap_amd64.go:212] [ 21426: 21426] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.223864 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.223954 678849 usertrap_amd64.go:122] [ 21426: 21426] Allocate a new trap: 0xc006bd95c0 39 D0307 12:03:03.224035 678849 usertrap_amd64.go:225] [ 21426: 21426] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.225097 678849 usertrap_amd64.go:212] [ 21425: 21425] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.225255 678849 usertrap_amd64.go:122] [ 21425: 21425] Allocate a new trap: 0xc00925f4a0 38 D0307 12:03:03.225731 678849 usertrap_amd64.go:225] [ 21425: 21425] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.226243 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.226577 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.228041 678849 usertrap_amd64.go:212] [ 21425: 21425] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.228127 678849 usertrap_amd64.go:122] [ 21425: 21425] Allocate a new trap: 0xc00925f4a0 39 D0307 12:03:03.228193 678849 usertrap_amd64.go:225] [ 21425: 21425] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.229130 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.229448 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.230406 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.230683 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.232318 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.232621 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.249972 678849 usertrap_amd64.go:212] [ 21422: 21422] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:03.250085 678849 usertrap_amd64.go:122] [ 21422: 21422] Allocate a new trap: 0xc00037fd70 40 D0307 12:03:03.250160 678849 usertrap_amd64.go:225] [ 21422: 21422] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.252932 678849 usertrap_amd64.go:212] [ 21422: 21422] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.253045 678849 usertrap_amd64.go:122] [ 21422: 21422] Allocate a new trap: 0xc00037fd70 41 D0307 12:03:03.253105 678849 usertrap_amd64.go:225] [ 21422: 21422] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:03.256142 678849 usertrap_amd64.go:212] [ 21428: 21428] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.256249 678849 usertrap_amd64.go:122] [ 21428: 21428] Allocate a new trap: 0xc009cad2f0 38 D0307 12:03:03.256808 678849 usertrap_amd64.go:225] [ 21428: 21428] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.258679 678849 usertrap_amd64.go:212] [ 21428: 21428] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.258738 678849 usertrap_amd64.go:122] [ 21428: 21428] Allocate a new trap: 0xc009cad2f0 39 D0307 12:03:03.258807 678849 usertrap_amd64.go:225] [ 21428: 21428] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.259218 678849 task_exit.go:204] [ 21422: 21422] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.259731 678849 task_exit.go:204] [ 21422: 21422] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.260509 678849 task_signals.go:204] [ 21422: 21427] Signal 21422, PID: 21427, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.260644 678849 task_exit.go:204] [ 21422: 21427] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.260891 678849 task_exit.go:204] [ 21422: 21427] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.260965 678849 task_exit.go:204] [ 21422: 21427] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.261138 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.261501 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.261164 678849 task_signals.go:204] [ 21422: 21429] Signal 21422, PID: 21429, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.262811 678849 task_exit.go:204] [ 21422: 21429] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.264808 678849 task_exit.go:204] [ 21422: 21429] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.264852 678849 task_exit.go:204] [ 21422: 21429] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.265411 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.265770 678849 task_exit.go:204] [ 21422: 21422] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.268047 678849 usertrap_amd64.go:212] [ 21426: 21426] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.268131 678849 usertrap_amd64.go:122] [ 21426: 21426] Allocate a new trap: 0xc006bd95c0 40 D0307 12:03:03.268248 678849 usertrap_amd64.go:225] [ 21426: 21426] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) 12:03:03 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x8000000000000000, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xd2b3, 0x8}, 0x10010, 0x10000, 0x22, 0x2, 0x100000000, 0x7fff, 0x4, 0x0, 0x6, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) D0307 12:03:03.271741 678849 task_exit.go:204] [ 21426: 21426] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.272089 678849 task_exit.go:204] [ 21426: 21426] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.272103 678849 task_signals.go:204] [ 21426: 21431] Signal 21426, PID: 21431, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.272272 678849 task_exit.go:204] [ 21426: 21431] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.272394 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.272755 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.274013 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.274268 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.274688 678849 task_exit.go:204] [ 21426: 21431] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.274742 678849 task_exit.go:204] [ 21426: 21431] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.274826 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.275237 678849 task_exit.go:204] [ 21426: 21426] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.275521 678849 usertrap_amd64.go:212] [ 21425: 21425] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.275620 678849 usertrap_amd64.go:122] [ 21425: 21425] Allocate a new trap: 0xc00925f4a0 40 D0307 12:03:03.275680 678849 usertrap_amd64.go:225] [ 21425: 21425] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.277021 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.277400 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.279063 678849 task_exit.go:204] [ 21425: 21425] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.279400 678849 task_signals.go:204] [ 21425: 21430] Signal 21425, PID: 21430, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.279442 678849 task_exit.go:204] [ 21425: 21425] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.279513 678849 task_exit.go:204] [ 21425: 21430] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.284545 678849 task_exit.go:204] [ 21425: 21430] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.284604 678849 task_exit.go:204] [ 21425: 21430] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.284711 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) D0307 12:03:03.285296 678849 task_exit.go:204] [ 21425: 21425] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.287683 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.288033 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.305667 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.306237 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.306517 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.306924 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.309370 678849 usertrap_amd64.go:212] [ 21432: 21432] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.309474 678849 usertrap_amd64.go:122] [ 21432: 21432] Allocate a new trap: 0xc00925f860 38 D0307 12:03:03.309910 678849 usertrap_amd64.go:225] [ 21432: 21432] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.313325 678849 usertrap_amd64.go:212] [ 21432: 21432] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.313455 678849 usertrap_amd64.go:122] [ 21432: 21432] Allocate a new trap: 0xc00925f860 39 D0307 12:03:03.313593 678849 usertrap_amd64.go:225] [ 21432: 21432] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:03.313907 678849 usertrap_amd64.go:212] [ 21428: 21428] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.314036 678849 usertrap_amd64.go:122] [ 21428: 21428] Allocate a new trap: 0xc009cad2f0 40 D0307 12:03:03.314098 678849 usertrap_amd64.go:225] [ 21428: 21428] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.315588 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.316018 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.317604 678849 task_exit.go:204] [ 21428: 21428] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.317863 678849 task_signals.go:204] [ 21428: 21433] Signal 21428, PID: 21433, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.318038 678849 task_exit.go:204] [ 21428: 21428] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.318354 678849 task_exit.go:204] [ 21428: 21433] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.320976 678849 task_exit.go:204] [ 21428: 21433] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.321051 678849 task_exit.go:204] [ 21428: 21433] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.321136 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.322110 678849 task_exit.go:204] [ 21428: 21428] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "336ae39145ab5b49", "aa6392cae04b43c40775e3153514c3c2", "da9045fa", "b1538825d0aa1b79"}, 0x28) (async) r1 = semget(0x0, 0x4, 0x80) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000040)=""/40) D0307 12:03:03.327583 678849 usertrap_amd64.go:212] [ 21434: 21434] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.327697 678849 usertrap_amd64.go:122] [ 21434: 21434] Allocate a new trap: 0xc0007f3110 38 D0307 12:03:03.328036 678849 usertrap_amd64.go:225] [ 21434: 21434] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.332990 678849 usertrap_amd64.go:212] [ 21434: 21434] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.333066 678849 usertrap_amd64.go:122] [ 21434: 21434] Allocate a new trap: 0xc0007f3110 39 D0307 12:03:03.333205 678849 usertrap_amd64.go:225] [ 21434: 21434] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.334013 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.334335 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.337806 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.338901 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.339701 678849 usertrap_amd64.go:212] [ 21435: 21435] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.339786 678849 usertrap_amd64.go:122] [ 21435: 21435] Allocate a new trap: 0xc00037ff80 38 D0307 12:03:03.340149 678849 usertrap_amd64.go:225] [ 21435: 21435] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.344882 678849 usertrap_amd64.go:212] [ 21435: 21435] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.345006 678849 usertrap_amd64.go:122] [ 21435: 21435] Allocate a new trap: 0xc00037ff80 39 D0307 12:03:03.345096 678849 usertrap_amd64.go:225] [ 21435: 21435] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.347009 678849 usertrap_amd64.go:212] [ 21432: 21432] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.347090 678849 usertrap_amd64.go:122] [ 21432: 21432] Allocate a new trap: 0xc00925f860 40 D0307 12:03:03.347221 678849 usertrap_amd64.go:225] [ 21432: 21432] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.350439 678849 task_exit.go:204] [ 21432: 21432] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.350764 678849 task_signals.go:204] [ 21432: 21436] Signal 21432, PID: 21436, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.350827 678849 task_exit.go:204] [ 21432: 21432] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.351135 678849 task_exit.go:204] [ 21432: 21436] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.354805 678849 task_exit.go:204] [ 21432: 21436] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.354908 678849 task_exit.go:204] [ 21432: 21436] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.355054 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.355442 678849 task_exit.go:204] [ 21432: 21432] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x8000000000000000, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xd2b3, 0x8}, 0x10010, 0x10000, 0x22, 0x2, 0x100000000, 0x7fff, 0x4, 0x0, 0x6, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) D0307 12:03:03.358638 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.359004 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.362828 678849 usertrap_amd64.go:212] [ 21437: 21437] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.362923 678849 usertrap_amd64.go:122] [ 21437: 21437] Allocate a new trap: 0xc009cad320 38 D0307 12:03:03.363233 678849 usertrap_amd64.go:225] [ 21437: 21437] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.364998 678849 usertrap_amd64.go:212] [ 21437: 21437] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.365082 678849 usertrap_amd64.go:122] [ 21437: 21437] Allocate a new trap: 0xc009cad320 39 D0307 12:03:03.365254 678849 usertrap_amd64.go:225] [ 21437: 21437] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.367816 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.368427 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.378460 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.378918 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.385761 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.386105 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.391925 678849 usertrap_amd64.go:212] [ 21435: 21435] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.392011 678849 usertrap_amd64.go:122] [ 21435: 21435] Allocate a new trap: 0xc00037ff80 40 D0307 12:03:03.392067 678849 usertrap_amd64.go:225] [ 21435: 21435] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.395077 678849 task_exit.go:204] [ 21435: 21435] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.395286 678849 task_exit.go:204] [ 21435: 21435] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.395740 678849 task_signals.go:204] [ 21435: 21438] Signal 21435, PID: 21438, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.395863 678849 task_exit.go:204] [ 21435: 21438] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.401199 678849 task_exit.go:204] [ 21435: 21438] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.401337 678849 task_exit.go:204] [ 21435: 21438] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.401521 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.402482 678849 task_exit.go:204] [ 21435: 21435] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.403468 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.403801 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.403838 678849 usertrap_amd64.go:212] [ 21440: 21440] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.403925 678849 usertrap_amd64.go:122] [ 21440: 21440] Allocate a new trap: 0xc007187650 38 D0307 12:03:03.404281 678849 usertrap_amd64.go:225] [ 21440: 21440] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.405952 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.406346 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.407490 678849 usertrap_amd64.go:212] [ 21434: 21434] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.407544 678849 usertrap_amd64.go:122] [ 21434: 21434] Allocate a new trap: 0xc0007f3110 40 D0307 12:03:03.407599 678849 usertrap_amd64.go:225] [ 21434: 21434] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.410832 678849 task_exit.go:204] [ 21434: 21434] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.411024 678849 task_signals.go:204] [ 21434: 21439] Signal 21434, PID: 21439, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.411118 678849 task_exit.go:204] [ 21434: 21434] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.412972 678849 task_exit.go:204] [ 21434: 21439] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.415133 678849 task_exit.go:204] [ 21434: 21439] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.415207 678849 task_exit.go:204] [ 21434: 21439] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.415310 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.416922 678849 usertrap_amd64.go:212] [ 21440: 21440] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.417016 678849 task_exit.go:204] [ 21434: 21434] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.417032 678849 usertrap_amd64.go:122] [ 21440: 21440] Allocate a new trap: 0xc007187650 39 D0307 12:03:03.417102 678849 usertrap_amd64.go:225] [ 21440: 21440] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) D0307 12:03:03.417960 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.418430 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.426410 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.426874 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.427824 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.428185 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.430284 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.433252 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.437654 678849 usertrap_amd64.go:212] [ 21437: 21437] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:03.437787 678849 usertrap_amd64.go:122] [ 21437: 21437] Allocate a new trap: 0xc009cad320 40 D0307 12:03:03.437971 678849 usertrap_amd64.go:225] [ 21437: 21437] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.444020 678849 usertrap_amd64.go:212] [ 21437: 21437] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.444123 678849 usertrap_amd64.go:122] [ 21437: 21437] Allocate a new trap: 0xc009cad320 41 D0307 12:03:03.444206 678849 usertrap_amd64.go:225] [ 21437: 21437] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:03.453462 678849 usertrap_amd64.go:212] [ 21442: 21442] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.453613 678849 usertrap_amd64.go:122] [ 21442: 21442] Allocate a new trap: 0xc00732bf50 38 D0307 12:03:03.454050 678849 usertrap_amd64.go:225] [ 21442: 21442] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.456765 678849 usertrap_amd64.go:212] [ 21442: 21442] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.456829 678849 usertrap_amd64.go:122] [ 21442: 21442] Allocate a new trap: 0xc00732bf50 39 D0307 12:03:03.456896 678849 usertrap_amd64.go:225] [ 21442: 21442] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.458949 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.459534 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.459932 678849 task_exit.go:204] [ 21437: 21437] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.460236 678849 task_exit.go:204] [ 21437: 21437] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.460808 678849 task_signals.go:204] [ 21437: 21441] Signal 21437, PID: 21441, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.461478 678849 task_exit.go:204] [ 21437: 21441] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.461895 678849 task_signals.go:204] [ 21437: 21443] Signal 21437, PID: 21443, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.462033 678849 task_exit.go:204] [ 21437: 21443] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.462265 678849 task_exit.go:204] [ 21437: 21443] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.462362 678849 task_exit.go:204] [ 21437: 21443] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.466974 678849 task_exit.go:204] [ 21437: 21441] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.467039 678849 task_exit.go:204] [ 21437: 21441] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.467126 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.468015 678849 task_exit.go:204] [ 21437: 21437] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.478856 678849 usertrap_amd64.go:212] [ 21440: 21440] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.479001 678849 usertrap_amd64.go:122] [ 21440: 21440] Allocate a new trap: 0xc007187650 40 D0307 12:03:03.479103 678849 usertrap_amd64.go:225] [ 21440: 21440] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.482391 678849 usertrap_amd64.go:212] [ 21446: 21446] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.482518 678849 usertrap_amd64.go:122] [ 21446: 21446] Allocate a new trap: 0xc0007f33b0 38 D0307 12:03:03.484221 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.484573 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "336ae39145ab5b49", "aa6392cae04b43c40775e3153514c3c2", "da9045fa", "b1538825d0aa1b79"}, 0x28) semget(0x0, 0x4, 0x80) (async) r1 = semget(0x0, 0x4, 0x80) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000040)=""/40) D0307 12:03:03.484961 678849 task_exit.go:204] [ 21440: 21440] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.485160 678849 usertrap_amd64.go:225] [ 21446: 21446] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.485182 678849 task_signals.go:204] [ 21440: 21445] Signal 21440, PID: 21445, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.485293 678849 task_signals.go:204] [ 21440: 21444] Signal 21440, PID: 21444, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.485386 678849 task_exit.go:204] [ 21440: 21440] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.485553 678849 task_exit.go:204] [ 21440: 21445] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.485780 678849 task_exit.go:204] [ 21440: 21445] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.485840 678849 task_exit.go:204] [ 21440: 21445] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.486110 678849 task_exit.go:204] [ 21440: 21444] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.488104 678849 task_exit.go:204] [ 21440: 21444] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.488218 678849 task_exit.go:204] [ 21440: 21444] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.488352 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.488922 678849 task_exit.go:204] [ 21440: 21440] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.489582 678849 usertrap_amd64.go:212] [ 21446: 21446] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.489630 678849 usertrap_amd64.go:122] [ 21446: 21446] Allocate a new trap: 0xc0007f33b0 39 D0307 12:03:03.489731 678849 usertrap_amd64.go:225] [ 21446: 21446] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.493190 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.497560 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:03 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x8000000000000000, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xd2b3, 0x8}, 0x10010, 0x10000, 0x22, 0x2, 0x100000000, 0x7fff, 0x4, 0x0, 0x6, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) D0307 12:03:03.509350 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.509728 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.509945 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.510201 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.511722 678849 usertrap_amd64.go:212] [ 21442: 21442] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.511799 678849 usertrap_amd64.go:122] [ 21442: 21442] Allocate a new trap: 0xc00732bf50 40 D0307 12:03:03.511897 678849 usertrap_amd64.go:225] [ 21442: 21442] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.515628 678849 task_exit.go:204] [ 21442: 21442] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.515918 678849 task_exit.go:204] [ 21442: 21442] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.516014 678849 usertrap_amd64.go:212] [ 21448: 21448] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.516106 678849 usertrap_amd64.go:122] [ 21448: 21448] Allocate a new trap: 0xc00925fc80 38 D0307 12:03:03.516822 678849 usertrap_amd64.go:225] [ 21448: 21448] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.517950 678849 task_signals.go:204] [ 21442: 21447] Signal 21442, PID: 21447, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.518064 678849 task_exit.go:204] [ 21442: 21447] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.519830 678849 task_exit.go:204] [ 21442: 21447] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.519904 678849 task_exit.go:204] [ 21442: 21447] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.519998 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.521145 678849 task_exit.go:204] [ 21442: 21442] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.524816 678849 usertrap_amd64.go:212] [ 21448: 21448] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.524889 678849 usertrap_amd64.go:122] [ 21448: 21448] Allocate a new trap: 0xc00925fc80 39 D0307 12:03:03.525030 678849 usertrap_amd64.go:225] [ 21448: 21448] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.526896 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.527255 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.528521 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.528759 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.555017 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.555432 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.555802 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.556166 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.558213 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.558581 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.560675 678849 usertrap_amd64.go:212] [ 21446: 21446] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.560754 678849 usertrap_amd64.go:122] [ 21446: 21446] Allocate a new trap: 0xc0007f33b0 40 D0307 12:03:03.560858 678849 usertrap_amd64.go:212] [ 21450: 21450] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.560925 678849 usertrap_amd64.go:122] [ 21450: 21450] Allocate a new trap: 0xc00925fe60 38 D0307 12:03:03.560922 678849 usertrap_amd64.go:225] [ 21446: 21446] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.561363 678849 usertrap_amd64.go:225] [ 21450: 21450] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.563819 678849 task_exit.go:204] [ 21446: 21446] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.564140 678849 task_signals.go:204] [ 21446: 21451] Signal 21446, PID: 21451, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.564265 678849 task_exit.go:204] [ 21446: 21451] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.564452 678849 task_exit.go:204] [ 21446: 21446] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.566787 678849 task_exit.go:204] [ 21446: 21451] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.566875 678849 task_exit.go:204] [ 21446: 21451] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.566954 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.568805 678849 task_exit.go:204] [ 21446: 21446] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0x4, 0xaf, 0x3, 0x40, 0xa, @private0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0xbe5, 0x3c}}) D0307 12:03:03.573005 678849 usertrap_amd64.go:212] [ 21448: 21448] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.573129 678849 usertrap_amd64.go:122] [ 21448: 21448] Allocate a new trap: 0xc00925fc80 40 D0307 12:03:03.573211 678849 usertrap_amd64.go:225] [ 21448: 21448] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.574481 678849 usertrap_amd64.go:212] [ 21450: 21450] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.574552 678849 usertrap_amd64.go:122] [ 21450: 21450] Allocate a new trap: 0xc00925fe60 39 D0307 12:03:03.574635 678849 usertrap_amd64.go:225] [ 21450: 21450] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.575722 678849 usertrap_amd64.go:212] [ 21449: 21449] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.575826 678849 task_exit.go:204] [ 21448: 21448] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.575825 678849 usertrap_amd64.go:122] [ 21449: 21449] Allocate a new trap: 0xc0012dc870 38 D0307 12:03:03.575965 678849 task_signals.go:204] [ 21448: 21452] Signal 21448, PID: 21452, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.576077 678849 task_exit.go:204] [ 21448: 21448] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.576202 678849 task_signals.go:204] [ 21448: 21453] Signal 21448, PID: 21453, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.576248 678849 task_exit.go:204] [ 21448: 21452] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.576442 678849 task_exit.go:204] [ 21448: 21452] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.576489 678849 task_exit.go:204] [ 21448: 21452] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.576609 678849 task_exit.go:204] [ 21448: 21453] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.578099 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.578420 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.578704 678849 task_exit.go:204] [ 21448: 21453] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.579222 678849 task_exit.go:204] [ 21448: 21453] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.579300 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.579562 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.579603 678849 usertrap_amd64.go:225] [ 21449: 21449] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.579971 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.579977 678849 task_exit.go:204] [ 21448: 21448] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x400, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x8, 0x1, 0x59, @mcast1, @dev={0xfe, 0x80, '\x00', 0x33}, 0x8000, 0x7c0, 0x2, 0x3}}) D0307 12:03:03.582167 678849 usertrap_amd64.go:212] [ 21449: 21449] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.582209 678849 usertrap_amd64.go:122] [ 21449: 21449] Allocate a new trap: 0xc0012dc870 39 D0307 12:03:03.582302 678849 usertrap_amd64.go:225] [ 21449: 21449] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:03.585434 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.585715 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.598303 678849 usertrap_amd64.go:212] [ 21450: 21450] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.598379 678849 usertrap_amd64.go:122] [ 21450: 21450] Allocate a new trap: 0xc00925fe60 40 D0307 12:03:03.598441 678849 usertrap_amd64.go:225] [ 21450: 21450] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.600936 678849 task_exit.go:204] [ 21450: 21450] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.601467 678849 task_signals.go:204] [ 21450: 21454] Signal 21450, PID: 21454, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.601550 678849 task_exit.go:204] [ 21450: 21450] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.601787 678849 task_exit.go:204] [ 21450: 21454] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.603780 678849 task_exit.go:204] [ 21450: 21454] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.603840 678849 task_exit.go:204] [ 21450: 21454] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.603922 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.605683 678849 task_exit.go:204] [ 21450: 21450] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.607034 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.608455 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.612403 678849 sampler.go:191] Time: Adjusting syscall overhead down to 478 D0307 12:03:03.618553 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.619072 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.625361 678849 usertrap_amd64.go:212] [ 21449: 21449] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.625541 678849 usertrap_amd64.go:122] [ 21449: 21449] Allocate a new trap: 0xc0012dc870 40 D0307 12:03:03.625831 678849 usertrap_amd64.go:225] [ 21449: 21449] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.632043 678849 usertrap_amd64.go:212] [ 21455: 21455] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.632158 678849 usertrap_amd64.go:122] [ 21455: 21455] Allocate a new trap: 0xc0076b2000 38 D0307 12:03:03.632354 678849 usertrap_amd64.go:212] [ 21456: 21456] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.632620 678849 usertrap_amd64.go:122] [ 21456: 21456] Allocate a new trap: 0xc009cad740 38 D0307 12:03:03.632487 678849 usertrap_amd64.go:225] [ 21455: 21455] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.633429 678849 usertrap_amd64.go:225] [ 21456: 21456] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.638052 678849 task_exit.go:204] [ 21449: 21449] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.638350 678849 task_signals.go:204] [ 21449: 21457] Signal 21449, PID: 21457, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.638579 678849 task_exit.go:204] [ 21449: 21457] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.638832 678849 task_exit.go:204] [ 21449: 21449] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.640392 678849 usertrap_amd64.go:212] [ 21456: 21456] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.640602 678849 usertrap_amd64.go:122] [ 21456: 21456] Allocate a new trap: 0xc009cad740 39 D0307 12:03:03.640815 678849 usertrap_amd64.go:225] [ 21456: 21456] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.640982 678849 task_exit.go:204] [ 21449: 21457] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.641061 678849 task_exit.go:204] [ 21449: 21457] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.641177 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.643488 678849 usertrap_amd64.go:212] [ 21458: 21458] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.643582 678849 usertrap_amd64.go:122] [ 21458: 21458] Allocate a new trap: 0xc0076b2030 38 D0307 12:03:03.643975 678849 usertrap_amd64.go:225] [ 21458: 21458] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.645238 678849 task_exit.go:204] [ 21449: 21449] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.646675 678849 usertrap_amd64.go:212] [ 21458: 21458] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.646749 678849 usertrap_amd64.go:122] [ 21458: 21458] Allocate a new trap: 0xc0076b2030 39 D0307 12:03:03.646814 678849 usertrap_amd64.go:225] [ 21458: 21458] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) 12:03:03 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000008) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:03.647572 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.648017 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.649709 678849 usertrap_amd64.go:212] [ 21455: 21455] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.649831 678849 usertrap_amd64.go:122] [ 21455: 21455] Allocate a new trap: 0xc0076b2000 39 D0307 12:03:03.649957 678849 usertrap_amd64.go:225] [ 21455: 21455] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.651743 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.652174 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.653279 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.656549 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.657854 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.659163 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.696980 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.697327 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.699652 678849 usertrap_amd64.go:212] [ 21456: 21456] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.699832 678849 usertrap_amd64.go:122] [ 21456: 21456] Allocate a new trap: 0xc009cad740 40 D0307 12:03:03.699994 678849 usertrap_amd64.go:225] [ 21456: 21456] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.701107 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.701487 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.705665 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.707166 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.708584 678849 usertrap_amd64.go:212] [ 21455: 21455] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.708682 678849 usertrap_amd64.go:122] [ 21455: 21455] Allocate a new trap: 0xc0076b2000 40 D0307 12:03:03.708764 678849 usertrap_amd64.go:225] [ 21455: 21455] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.715008 678849 usertrap_amd64.go:212] [ 21460: 21460] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.715152 678849 usertrap_amd64.go:122] [ 21460: 21460] Allocate a new trap: 0xc0076b2210 38 D0307 12:03:03.715740 678849 usertrap_amd64.go:225] [ 21460: 21460] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.715892 678849 usertrap_amd64.go:212] [ 21458: 21458] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.715961 678849 usertrap_amd64.go:122] [ 21458: 21458] Allocate a new trap: 0xc0076b2030 40 D0307 12:03:03.716052 678849 usertrap_amd64.go:225] [ 21458: 21458] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.717021 678849 task_exit.go:204] [ 21455: 21455] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.717257 678849 task_exit.go:204] [ 21455: 21455] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.718099 678849 task_exit.go:204] [ 21456: 21456] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.718252 678849 task_signals.go:204] [ 21455: 21461] Signal 21455, PID: 21461, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.718334 678849 task_signals.go:204] [ 21456: 21459] Signal 21456, PID: 21459, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.718444 678849 task_exit.go:204] [ 21456: 21456] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.718587 678849 task_exit.go:204] [ 21455: 21461] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.719384 678849 task_exit.go:204] [ 21456: 21459] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.720420 678849 usertrap_amd64.go:212] [ 21460: 21460] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.720501 678849 usertrap_amd64.go:122] [ 21460: 21460] Allocate a new trap: 0xc0076b2210 39 D0307 12:03:03.720595 678849 usertrap_amd64.go:225] [ 21460: 21460] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:03.720782 678849 task_exit.go:204] [ 21458: 21458] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.721001 678849 task_exit.go:204] [ 21458: 21458] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.722387 678849 task_exit.go:204] [ 21456: 21459] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.722467 678849 task_exit.go:204] [ 21456: 21459] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.722590 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.722806 678849 task_signals.go:204] [ 21458: 21462] Signal 21458, PID: 21462, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.722926 678849 task_exit.go:204] [ 21458: 21462] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.723678 678849 task_exit.go:204] [ 21456: 21456] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.723980 678849 task_exit.go:204] [ 21455: 21461] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.724020 678849 task_exit.go:204] [ 21455: 21461] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.724122 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.724090 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.724483 678849 task_exit.go:204] [ 21455: 21455] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.724624 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)) D0307 12:03:03.725995 678849 task_exit.go:204] [ 21458: 21462] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.726108 678849 task_exit.go:204] [ 21458: 21462] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.726326 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.726551 678849 task_exit.go:204] [ 21458: 21458] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) 12:03:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x400, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x8, 0x1, 0x59, @mcast1, @dev={0xfe, 0x80, '\x00', 0x33}, 0x8000, 0x7c0, 0x2, 0x3}}) D0307 12:03:03.738824 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.739233 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.740268 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.740638 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.742919 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.743352 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.769931 678849 usertrap_amd64.go:212] [ 21460: 21460] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.770001 678849 usertrap_amd64.go:122] [ 21460: 21460] Allocate a new trap: 0xc0076b2210 40 D0307 12:03:03.770070 678849 usertrap_amd64.go:225] [ 21460: 21460] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:03.772444 678849 task_exit.go:204] [ 21460: 21460] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.772660 678849 task_signals.go:204] [ 21460: 21466] Signal 21460, PID: 21466, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.772777 678849 task_exit.go:204] [ 21460: 21466] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.773115 678849 task_exit.go:204] [ 21460: 21460] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.774975 678849 task_exit.go:204] [ 21460: 21466] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.775052 678849 task_exit.go:204] [ 21460: 21466] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.775181 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.775268 678849 task_exit.go:204] [ 21460: 21460] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000008) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) inotify_init() (async) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000008) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) D0307 12:03:03.785148 678849 usertrap_amd64.go:212] [ 21464: 21464] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.785291 678849 usertrap_amd64.go:122] [ 21464: 21464] Allocate a new trap: 0xc0098e03c0 38 D0307 12:03:03.785791 678849 usertrap_amd64.go:225] [ 21464: 21464] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.788770 678849 usertrap_amd64.go:212] [ 21464: 21464] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.788835 678849 usertrap_amd64.go:122] [ 21464: 21464] Allocate a new trap: 0xc0098e03c0 39 D0307 12:03:03.788924 678849 usertrap_amd64.go:225] [ 21464: 21464] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.789790 678849 usertrap_amd64.go:212] [ 21463: 21463] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.789935 678849 usertrap_amd64.go:122] [ 21463: 21463] Allocate a new trap: 0xc00853b2c0 38 D0307 12:03:03.789918 678849 usertrap_amd64.go:212] [ 21465: 21465] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.790171 678849 usertrap_amd64.go:122] [ 21465: 21465] Allocate a new trap: 0xc0007f3620 38 D0307 12:03:03.790312 678849 usertrap_amd64.go:225] [ 21463: 21463] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.790549 678849 usertrap_amd64.go:225] [ 21465: 21465] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:03.792499 678849 usertrap_amd64.go:212] [ 21463: 21463] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.792578 678849 usertrap_amd64.go:122] [ 21463: 21463] Allocate a new trap: 0xc00853b2c0 39 D0307 12:03:03.792677 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.792668 678849 usertrap_amd64.go:225] [ 21463: 21463] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.793154 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.793207 678849 usertrap_amd64.go:212] [ 21465: 21465] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.793434 678849 usertrap_amd64.go:122] [ 21465: 21465] Allocate a new trap: 0xc0007f3620 39 D0307 12:03:03.793525 678849 usertrap_amd64.go:225] [ 21465: 21465] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.796514 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.797942 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.798268 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.798544 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.802027 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.805567 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.850892 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.851811 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.852392 678849 usertrap_amd64.go:212] [ 21467: 21467] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.852526 678849 usertrap_amd64.go:122] [ 21467: 21467] Allocate a new trap: 0xc009cb3560 38 D0307 12:03:03.852888 678849 usertrap_amd64.go:225] [ 21467: 21467] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:03.856453 678849 usertrap_amd64.go:212] [ 21467: 21467] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:03.856526 678849 usertrap_amd64.go:122] [ 21467: 21467] Allocate a new trap: 0xc009cb3560 39 D0307 12:03:03.856590 678849 usertrap_amd64.go:225] [ 21467: 21467] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:03.857992 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.859300 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.859730 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.860499 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.861866 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.863982 678849 usertrap_amd64.go:212] [ 21463: 21463] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.864068 678849 usertrap_amd64.go:122] [ 21463: 21463] Allocate a new trap: 0xc00853b2c0 40 D0307 12:03:03.864150 678849 usertrap_amd64.go:225] [ 21463: 21463] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.864811 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.867563 678849 usertrap_amd64.go:212] [ 21464: 21464] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.867626 678849 usertrap_amd64.go:122] [ 21464: 21464] Allocate a new trap: 0xc0098e03c0 40 D0307 12:03:03.867685 678849 usertrap_amd64.go:225] [ 21464: 21464] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.867785 678849 task_exit.go:204] [ 21463: 21463] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.868196 678849 task_exit.go:204] [ 21463: 21463] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.868500 678849 task_signals.go:204] [ 21463: 21470] Signal 21463, PID: 21470, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.868603 678849 task_exit.go:204] [ 21463: 21470] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.870233 678849 task_exit.go:204] [ 21464: 21464] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.870372 678849 task_signals.go:204] [ 21464: 21468] Signal 21464, PID: 21468, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.870474 678849 task_exit.go:204] [ 21464: 21468] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.870585 678849 task_exit.go:204] [ 21464: 21464] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.873877 678849 task_exit.go:204] [ 21463: 21470] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.874016 678849 task_exit.go:204] [ 21463: 21470] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.877766 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.877946 678849 task_exit.go:204] [ 21463: 21463] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.881945 678849 task_exit.go:204] [ 21464: 21468] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.882032 678849 task_exit.go:204] [ 21464: 21468] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.882144 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.883067 678849 task_exit.go:204] [ 21464: 21464] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) D0307 12:03:03.889824 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.890362 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.899176 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.899588 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.913155 678849 usertrap_amd64.go:212] [ 21465: 21465] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:03.913245 678849 usertrap_amd64.go:122] [ 21465: 21465] Allocate a new trap: 0xc0007f3620 40 D0307 12:03:03.913442 678849 usertrap_amd64.go:225] [ 21465: 21465] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:03.916339 678849 task_exit.go:204] [ 21465: 21465] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.916516 678849 task_signals.go:204] [ 21465: 21469] Signal 21465, PID: 21469, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.916609 678849 task_exit.go:204] [ 21465: 21465] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.916605 678849 task_signals.go:204] [ 21465: 21471] Signal 21465, PID: 21471, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.916703 678849 task_exit.go:204] [ 21465: 21471] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.916914 678849 task_exit.go:204] [ 21465: 21471] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.917028 678849 task_exit.go:204] [ 21465: 21471] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.917847 678849 task_exit.go:204] [ 21465: 21469] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.918483 678849 usertrap_amd64.go:212] [ 21473: 21473] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:03.918606 678849 usertrap_amd64.go:122] [ 21473: 21473] Allocate a new trap: 0xc009cb3620 38 D0307 12:03:03.919481 678849 task_exit.go:204] [ 21465: 21469] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.919548 678849 task_exit.go:204] [ 21465: 21469] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.919569 678849 usertrap_amd64.go:225] [ 21473: 21473] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:03.919627 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:03.920771 678849 task_exit.go:204] [ 21465: 21465] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.924513 678849 usertrap_amd64.go:212] [ 21467: 21467] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:03.924629 678849 usertrap_amd64.go:122] [ 21467: 21467] Allocate a new trap: 0xc009cb3560 40 D0307 12:03:03.924758 678849 usertrap_amd64.go:225] [ 21467: 21467] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) 12:03:03 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x400, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x400, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x8, 0x1, 0x59, @mcast1, @dev={0xfe, 0x80, '\x00', 0x33}, 0x8000, 0x7c0, 0x2, 0x3}}) D0307 12:03:03.927418 678849 usertrap_amd64.go:212] [ 21473: 21473] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:03.927486 678849 usertrap_amd64.go:122] [ 21473: 21473] Allocate a new trap: 0xc009cb3620 39 D0307 12:03:03.927546 678849 usertrap_amd64.go:225] [ 21473: 21473] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:03.929752 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.931346 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.934147 678849 usertrap_amd64.go:212] [ 21474: 21474] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:03.934262 678849 usertrap_amd64.go:122] [ 21474: 21474] Allocate a new trap: 0xc007f55800 38 D0307 12:03:03.934710 678849 usertrap_amd64.go:225] [ 21474: 21474] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:03.937393 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.937827 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.938636 678849 usertrap_amd64.go:212] [ 21467: 21467] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:03.938704 678849 usertrap_amd64.go:122] [ 21467: 21467] Allocate a new trap: 0xc009cb3560 41 D0307 12:03:03.938788 678849 usertrap_amd64.go:225] [ 21467: 21467] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:03.940007 678849 usertrap_amd64.go:212] [ 21474: 21474] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:03.940086 678849 usertrap_amd64.go:122] [ 21474: 21474] Allocate a new trap: 0xc007f55800 39 D0307 12:03:03.940194 678849 usertrap_amd64.go:225] [ 21474: 21474] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:03.942387 678849 task_exit.go:204] [ 21467: 21467] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.942669 678849 task_signals.go:204] [ 21467: 21475] Signal 21467, PID: 21475, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.942734 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.942787 678849 task_exit.go:204] [ 21467: 21475] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.942733 678849 task_signals.go:204] [ 21467: 21472] Signal 21467, PID: 21472, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.942992 678849 task_exit.go:204] [ 21467: 21472] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.943056 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.943713 678849 task_exit.go:204] [ 21467: 21467] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.943836 678849 task_exit.go:204] [ 21467: 21475] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.943911 678849 task_exit.go:204] [ 21467: 21475] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:03 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000008) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:03.945198 678849 task_exit.go:204] [ 21467: 21472] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.945278 678849 task_exit.go:204] [ 21467: 21472] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.945372 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:03.945462 678849 task_exit.go:204] [ 21467: 21467] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.965797 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.966611 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.967271 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.968226 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.970564 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.970825 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.972120 678849 usertrap_amd64.go:212] [ 21474: 21474] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:03.972214 678849 usertrap_amd64.go:122] [ 21474: 21474] Allocate a new trap: 0xc007f55800 40 D0307 12:03:03.972312 678849 usertrap_amd64.go:225] [ 21474: 21474] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:03.972626 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.973219 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.975364 678849 task_exit.go:204] [ 21474: 21474] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.975504 678849 usertrap_amd64.go:212] [ 21473: 21473] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:03.975567 678849 usertrap_amd64.go:122] [ 21473: 21473] Allocate a new trap: 0xc009cb3620 40 D0307 12:03:03.975670 678849 usertrap_amd64.go:225] [ 21473: 21473] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:03.975725 678849 task_signals.go:204] [ 21474: 21477] Signal 21474, PID: 21477, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.975836 678849 task_exit.go:204] [ 21474: 21477] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.976210 678849 task_exit.go:204] [ 21474: 21477] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.976278 678849 task_exit.go:204] [ 21474: 21477] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.978403 678849 task_exit.go:204] [ 21474: 21474] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.978535 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:03.979168 678849 task_exit.go:204] [ 21474: 21474] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.979665 678849 usertrap_amd64.go:212] [ 21476: 21476] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:03.979727 678849 usertrap_amd64.go:122] [ 21476: 21476] Allocate a new trap: 0xc007f55830 38 D0307 12:03:03.980410 678849 usertrap_amd64.go:225] [ 21476: 21476] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) 12:03:03 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) D0307 12:03:03.982723 678849 usertrap_amd64.go:212] [ 21476: 21476] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:03.982794 678849 usertrap_amd64.go:122] [ 21476: 21476] Allocate a new trap: 0xc007f55830 39 D0307 12:03:03.982854 678849 usertrap_amd64.go:225] [ 21476: 21476] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:03.983424 678849 task_exit.go:204] [ 21473: 21473] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.983667 678849 task_signals.go:204] [ 21473: 21478] Signal 21473, PID: 21478, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:03.983751 678849 task_exit.go:204] [ 21473: 21473] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.983994 678849 task_exit.go:204] [ 21473: 21478] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:03.985979 678849 task_exit.go:204] [ 21473: 21478] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:03.986039 678849 task_exit.go:204] [ 21473: 21478] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.986163 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:03.986541 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:03.986604 678849 task_exit.go:204] [ 21473: 21473] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:03.989783 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:03 executing program 2: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:03.995475 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:03.996497 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:03.999779 678849 usertrap_amd64.go:212] [ 21479: 21479] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:03.999910 678849 usertrap_amd64.go:122] [ 21479: 21479] Allocate a new trap: 0xc007f558c0 38 D0307 12:03:04.000231 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.000442 678849 usertrap_amd64.go:225] [ 21479: 21479] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.000595 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.009996 678849 usertrap_amd64.go:212] [ 21479: 21479] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.010065 678849 usertrap_amd64.go:122] [ 21479: 21479] Allocate a new trap: 0xc007f558c0 39 D0307 12:03:04.010153 678849 usertrap_amd64.go:225] [ 21479: 21479] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.014505 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.014846 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.025649 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.025964 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.026838 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.027204 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.031886 678849 usertrap_amd64.go:212] [ 21476: 21476] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.032014 678849 usertrap_amd64.go:122] [ 21476: 21476] Allocate a new trap: 0xc007f55830 40 D0307 12:03:04.032105 678849 usertrap_amd64.go:225] [ 21476: 21476] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.032498 678849 usertrap_amd64.go:212] [ 21480: 21480] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.032623 678849 usertrap_amd64.go:122] [ 21480: 21480] Allocate a new trap: 0xc009cb3890 38 D0307 12:03:04.033070 678849 usertrap_amd64.go:225] [ 21480: 21480] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.034507 678849 usertrap_amd64.go:212] [ 21483: 21483] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.034624 678849 usertrap_amd64.go:122] [ 21483: 21483] Allocate a new trap: 0xc007f559e0 38 D0307 12:03:04.035525 678849 usertrap_amd64.go:212] [ 21480: 21480] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.035583 678849 usertrap_amd64.go:122] [ 21480: 21480] Allocate a new trap: 0xc009cb3890 39 D0307 12:03:04.035652 678849 usertrap_amd64.go:225] [ 21480: 21480] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.037859 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.038251 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.043203 678849 task_exit.go:204] [ 21476: 21476] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.043498 678849 task_signals.go:204] [ 21476: 21482] Signal 21476, PID: 21482, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.043587 678849 task_exit.go:204] [ 21476: 21482] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.043817 678849 task_exit.go:204] [ 21476: 21482] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.043864 678849 task_exit.go:204] [ 21476: 21482] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.045808 678849 task_exit.go:204] [ 21476: 21476] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.045997 678849 task_signals.go:204] [ 21476: 21481] Signal 21476, PID: 21481, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.046114 678849 task_exit.go:204] [ 21476: 21481] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.048640 678849 task_exit.go:204] [ 21476: 21481] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.048713 678849 task_exit.go:204] [ 21476: 21481] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.048840 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.049256 678849 usertrap_amd64.go:225] [ 21483: 21483] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.051305 678849 usertrap_amd64.go:212] [ 21483: 21483] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.051362 678849 usertrap_amd64.go:122] [ 21483: 21483] Allocate a new trap: 0xc007f559e0 39 D0307 12:03:04.051443 678849 usertrap_amd64.go:225] [ 21483: 21483] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.052205 678849 task_exit.go:204] [ 21476: 21476] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.054131 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.054480 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="46294f0d78594036a0ae11a43c21b02e1a4557e398aab31ef8158e723f29fd531689dc0629d525c2eefc4a9fca8635d16f071a0a1c765274be021b647f75cf46860c7977e1fa5897c7a236a02d7a214160b39ae7a910682bb32b12c117ad265bb1", 0x61, r0) keyctl$link(0x8, r1, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="eef6e6490a7ec1aab36af450712b86e5fe29ce9a3477ff5c4ef8e3897cb8d09e93404d27ecba5945ff9b", 0x2a, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r3, 0x4, 0xc0, 0x7, 0x4e, 0x63, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x7800, 0x0, 0x1f}}) D0307 12:03:04.061258 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.064295 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.064456 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.064624 678849 usertrap_amd64.go:212] [ 21479: 21479] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.064710 678849 usertrap_amd64.go:122] [ 21479: 21479] Allocate a new trap: 0xc007f558c0 40 D0307 12:03:04.064719 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.064801 678849 usertrap_amd64.go:225] [ 21479: 21479] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.068042 678849 task_exit.go:204] [ 21479: 21479] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.068295 678849 task_signals.go:204] [ 21479: 21484] Signal 21479, PID: 21484, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.068463 678849 task_signals.go:204] [ 21479: 21486] Signal 21479, PID: 21486, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.068581 678849 task_exit.go:204] [ 21479: 21486] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.068910 678849 task_exit.go:204] [ 21479: 21486] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.069043 678849 task_exit.go:204] [ 21479: 21486] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.069226 678849 task_exit.go:204] [ 21479: 21484] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.069266 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.069758 678849 task_exit.go:204] [ 21479: 21479] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.069933 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.070917 678849 usertrap_amd64.go:212] [ 21480: 21480] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.071023 678849 usertrap_amd64.go:122] [ 21480: 21480] Allocate a new trap: 0xc009cb3890 40 D0307 12:03:04.071170 678849 usertrap_amd64.go:225] [ 21480: 21480] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.072110 678849 task_exit.go:204] [ 21479: 21484] Transitioning from exit state TaskExitInitiated to TaskExitZombie 12:03:04 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x6) D0307 12:03:04.072165 678849 task_exit.go:204] [ 21479: 21484] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.072290 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.072580 678849 task_exit.go:204] [ 21479: 21479] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.079750 678849 task_exit.go:204] [ 21480: 21480] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.079879 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.079969 678849 task_exit.go:204] [ 21480: 21480] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.080203 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.080319 678849 task_signals.go:204] [ 21480: 21485] Signal 21480, PID: 21485, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.080428 678849 task_exit.go:204] [ 21480: 21485] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.080779 678849 usertrap_amd64.go:212] [ 21483: 21483] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.080842 678849 usertrap_amd64.go:122] [ 21483: 21483] Allocate a new trap: 0xc007f559e0 40 D0307 12:03:04.080907 678849 usertrap_amd64.go:225] [ 21483: 21483] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.083377 678849 task_exit.go:204] [ 21480: 21485] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.083448 678849 task_exit.go:204] [ 21480: 21485] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.083531 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.084443 678849 task_exit.go:204] [ 21480: 21480] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.088096 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.088410 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.091589 678849 task_exit.go:204] [ 21483: 21483] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.091917 678849 task_signals.go:204] [ 21483: 21488] Signal 21483, PID: 21488, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.092047 678849 task_exit.go:204] [ 21483: 21488] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.092155 678849 task_exit.go:204] [ 21483: 21483] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.093789 678849 usertrap_amd64.go:212] [ 21487: 21487] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:04.093864 678849 usertrap_amd64.go:122] [ 21487: 21487] Allocate a new trap: 0xc006bd9e90 38 D0307 12:03:04.094189 678849 usertrap_amd64.go:225] [ 21487: 21487] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:04.094308 678849 task_exit.go:204] [ 21483: 21488] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.094358 678849 task_exit.go:204] [ 21483: 21488] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.094423 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.095167 678849 task_exit.go:204] [ 21483: 21483] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.100843 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.101150 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.103161 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.103646 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.105007 678849 usertrap_amd64.go:212] [ 21487: 21487] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:04.105075 678849 usertrap_amd64.go:122] [ 21487: 21487] Allocate a new trap: 0xc006bd9e90 39 D0307 12:03:04.105155 678849 usertrap_amd64.go:225] [ 21487: 21487] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:04.106986 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.107280 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.134334 678849 usertrap_amd64.go:212] [ 21490: 21490] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.134513 678849 usertrap_amd64.go:122] [ 21490: 21490] Allocate a new trap: 0xc008f964b0 38 D0307 12:03:04.135018 678849 usertrap_amd64.go:225] [ 21490: 21490] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.135836 678849 usertrap_amd64.go:212] [ 21489: 21489] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.135959 678849 usertrap_amd64.go:122] [ 21489: 21489] Allocate a new trap: 0xc001fa15c0 38 D0307 12:03:04.136270 678849 usertrap_amd64.go:225] [ 21489: 21489] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.137844 678849 usertrap_amd64.go:212] [ 21490: 21490] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.137954 678849 usertrap_amd64.go:122] [ 21490: 21490] Allocate a new trap: 0xc008f964b0 39 D0307 12:03:04.138091 678849 usertrap_amd64.go:225] [ 21490: 21490] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.138176 678849 usertrap_amd64.go:212] [ 21489: 21489] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.138229 678849 usertrap_amd64.go:122] [ 21489: 21489] Allocate a new trap: 0xc001fa15c0 39 D0307 12:03:04.138319 678849 usertrap_amd64.go:225] [ 21489: 21489] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.138764 678849 usertrap_amd64.go:212] [ 21491: 21491] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.138845 678849 usertrap_amd64.go:122] [ 21491: 21491] Allocate a new trap: 0xc008f96510 38 D0307 12:03:04.139343 678849 usertrap_amd64.go:225] [ 21491: 21491] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.140910 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.141333 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.141885 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.142128 678849 usertrap_amd64.go:212] [ 21491: 21491] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.142217 678849 usertrap_amd64.go:122] [ 21491: 21491] Allocate a new trap: 0xc008f96510 39 D0307 12:03:04.142259 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.142329 678849 usertrap_amd64.go:225] [ 21491: 21491] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.145745 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.146517 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.162178 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.162608 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.165509 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.165771 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.170140 678849 usertrap_amd64.go:212] [ 21490: 21490] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.170211 678849 usertrap_amd64.go:122] [ 21490: 21490] Allocate a new trap: 0xc008f964b0 40 D0307 12:03:04.170296 678849 usertrap_amd64.go:225] [ 21490: 21490] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.172202 678849 usertrap_amd64.go:212] [ 21487: 21487] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.172295 678849 usertrap_amd64.go:122] [ 21487: 21487] Allocate a new trap: 0xc006bd9e90 40 D0307 12:03:04.172362 678849 usertrap_amd64.go:225] [ 21487: 21487] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.176088 678849 task_exit.go:204] [ 21487: 21487] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.176234 678849 task_signals.go:204] [ 21487: 21492] Signal 21487, PID: 21492, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.176273 678849 task_exit.go:204] [ 21487: 21487] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.176349 678849 task_exit.go:204] [ 21487: 21492] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.177249 678849 task_exit.go:204] [ 21490: 21490] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.177488 678849 task_exit.go:204] [ 21490: 21490] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.177878 678849 task_signals.go:204] [ 21490: 21493] Signal 21490, PID: 21493, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.177962 678849 task_exit.go:204] [ 21487: 21492] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.178050 678849 task_exit.go:204] [ 21487: 21492] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.178136 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.178259 678849 task_exit.go:204] [ 21490: 21493] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.179858 678849 task_exit.go:204] [ 21487: 21487] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.180703 678849 task_exit.go:204] [ 21490: 21493] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.180823 678849 task_exit.go:204] [ 21490: 21493] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="46294f0d78594036a0ae11a43c21b02e1a4557e398aab31ef8158e723f29fd531689dc0629d525c2eefc4a9fca8635d16f071a0a1c765274be021b647f75cf46860c7977e1fa5897c7a236a02d7a214160b39ae7a910682bb32b12c117ad265bb1", 0x61, r0) keyctl$link(0x8, r1, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="eef6e6490a7ec1aab36af450712b86e5fe29ce9a3477ff5c4ef8e3897cb8d09e93404d27ecba5945ff9b", 0x2a, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r3, 0x4, 0xc0, 0x7, 0x4e, 0x63, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x7800, 0x0, 0x1f}}) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="46294f0d78594036a0ae11a43c21b02e1a4557e398aab31ef8158e723f29fd531689dc0629d525c2eefc4a9fca8635d16f071a0a1c765274be021b647f75cf46860c7977e1fa5897c7a236a02d7a214160b39ae7a910682bb32b12c117ad265bb1", 0x61, r0) (async) keyctl$link(0x8, r1, r0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)) (async) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="eef6e6490a7ec1aab36af450712b86e5fe29ce9a3477ff5c4ef8e3897cb8d09e93404d27ecba5945ff9b", 0x2a, r0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r3, 0x4, 0xc0, 0x7, 0x4e, 0x63, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x7800, 0x0, 0x1f}}) (async) D0307 12:03:04.180971 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.181169 678849 task_exit.go:204] [ 21490: 21490] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.182364 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.182822 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.185056 678849 usertrap_amd64.go:212] [ 21489: 21489] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.185144 678849 usertrap_amd64.go:122] [ 21489: 21489] Allocate a new trap: 0xc001fa15c0 40 D0307 12:03:04.185224 678849 usertrap_amd64.go:225] [ 21489: 21489] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.187170 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.187596 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.188728 678849 usertrap_amd64.go:212] [ 21491: 21491] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.188784 678849 usertrap_amd64.go:122] [ 21491: 21491] Allocate a new trap: 0xc008f96510 40 D0307 12:03:04.188853 678849 usertrap_amd64.go:225] [ 21491: 21491] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.189450 678849 task_exit.go:204] [ 21489: 21489] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.189639 678849 task_signals.go:204] [ 21489: 21495] Signal 21489, PID: 21495, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.189761 678849 task_exit.go:204] [ 21489: 21495] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.189980 678849 task_exit.go:204] [ 21489: 21489] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.190844 678849 task_exit.go:204] [ 21491: 21491] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.191052 678849 task_exit.go:204] [ 21491: 21491] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.191030 678849 task_signals.go:204] [ 21491: 21494] Signal 21491, PID: 21494, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.191131 678849 task_exit.go:204] [ 21491: 21494] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.191419 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.191672 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.192766 678849 task_exit.go:204] [ 21489: 21495] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.192840 678849 task_exit.go:204] [ 21489: 21495] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.192996 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.193900 678849 task_exit.go:204] [ 21489: 21489] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.194888 678849 task_exit.go:204] [ 21491: 21494] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.194988 678849 task_exit.go:204] [ 21491: 21494] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.195085 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.196067 678849 task_exit.go:204] [ 21491: 21491] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.196822 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.197121 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.199610 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.199896 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) 12:03:04 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x6) D0307 12:03:04.212774 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.213159 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.216039 678849 usertrap_amd64.go:212] [ 21496: 21496] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:04.216112 678849 usertrap_amd64.go:122] [ 21496: 21496] Allocate a new trap: 0xc00853b560 38 D0307 12:03:04.216554 678849 usertrap_amd64.go:225] [ 21496: 21496] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:04.216929 678849 usertrap_amd64.go:212] [ 21497: 21497] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.217036 678849 usertrap_amd64.go:122] [ 21497: 21497] Allocate a new trap: 0xc0007f3a70 38 D0307 12:03:04.217416 678849 usertrap_amd64.go:225] [ 21497: 21497] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.218829 678849 usertrap_amd64.go:212] [ 21496: 21496] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:04.218974 678849 usertrap_amd64.go:122] [ 21496: 21496] Allocate a new trap: 0xc00853b560 39 D0307 12:03:04.219072 678849 usertrap_amd64.go:225] [ 21496: 21496] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:04.219722 678849 usertrap_amd64.go:212] [ 21497: 21497] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.219811 678849 usertrap_amd64.go:122] [ 21497: 21497] Allocate a new trap: 0xc0007f3a70 39 D0307 12:03:04.219899 678849 usertrap_amd64.go:225] [ 21497: 21497] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.222538 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.222876 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.230969 678849 usertrap_amd64.go:212] [ 21498: 21498] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.231051 678849 usertrap_amd64.go:122] [ 21498: 21498] Allocate a new trap: 0xc0012dd110 38 D0307 12:03:04.231438 678849 usertrap_amd64.go:225] [ 21498: 21498] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.232677 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.233026 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.235683 678849 usertrap_amd64.go:212] [ 21498: 21498] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.235823 678849 usertrap_amd64.go:122] [ 21498: 21498] Allocate a new trap: 0xc0012dd110 39 D0307 12:03:04.235983 678849 usertrap_amd64.go:225] [ 21498: 21498] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.238477 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.238904 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.239747 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.240038 678849 usertrap_amd64.go:212] [ 21497: 21497] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.240110 678849 usertrap_amd64.go:122] [ 21497: 21497] Allocate a new trap: 0xc0007f3a70 40 D0307 12:03:04.240220 678849 usertrap_amd64.go:225] [ 21497: 21497] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.240250 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.245825 678849 task_exit.go:204] [ 21497: 21497] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.246187 678849 task_exit.go:204] [ 21497: 21497] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.246439 678849 task_signals.go:204] [ 21497: 21500] Signal 21497, PID: 21500, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.246551 678849 task_exit.go:204] [ 21497: 21500] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.248358 678849 task_exit.go:204] [ 21497: 21500] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.248438 678849 task_exit.go:204] [ 21497: 21500] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.248531 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.249059 678849 task_exit.go:204] [ 21497: 21497] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.249607 678849 usertrap_amd64.go:212] [ 21499: 21499] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.249696 678849 usertrap_amd64.go:122] [ 21499: 21499] Allocate a new trap: 0xc00853b590 38 D0307 12:03:04.250173 678849 usertrap_amd64.go:225] [ 21499: 21499] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.251615 678849 usertrap_amd64.go:212] [ 21499: 21499] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.251712 678849 usertrap_amd64.go:122] [ 21499: 21499] Allocate a new trap: 0xc00853b590 39 D0307 12:03:04.251790 678849 usertrap_amd64.go:225] [ 21499: 21499] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.254976 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.255812 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.257802 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.258198 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.296024 678849 usertrap_amd64.go:212] [ 21502: 21502] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.296090 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.296139 678849 usertrap_amd64.go:122] [ 21502: 21502] Allocate a new trap: 0xc009cb3d70 38 D0307 12:03:04.296533 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.296961 678849 usertrap_amd64.go:225] [ 21502: 21502] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.300157 678849 usertrap_amd64.go:212] [ 21498: 21498] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.300253 678849 usertrap_amd64.go:122] [ 21498: 21498] Allocate a new trap: 0xc0012dd110 40 D0307 12:03:04.300332 678849 usertrap_amd64.go:225] [ 21498: 21498] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.301380 678849 usertrap_amd64.go:212] [ 21502: 21502] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.301488 678849 usertrap_amd64.go:122] [ 21502: 21502] Allocate a new trap: 0xc009cb3d70 39 D0307 12:03:04.301596 678849 usertrap_amd64.go:225] [ 21502: 21502] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.302213 678849 usertrap_amd64.go:212] [ 21499: 21499] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.302293 678849 usertrap_amd64.go:122] [ 21499: 21499] Allocate a new trap: 0xc00853b590 40 D0307 12:03:04.302613 678849 usertrap_amd64.go:225] [ 21499: 21499] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.303309 678849 task_exit.go:204] [ 21498: 21498] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.303613 678849 task_exit.go:204] [ 21498: 21498] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.303749 678849 task_signals.go:204] [ 21498: 21501] Signal 21498, PID: 21501, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.303777 678849 task_signals.go:204] [ 21498: 21505] Signal 21498, PID: 21505, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.303908 678849 task_exit.go:204] [ 21498: 21501] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.304168 678849 task_exit.go:204] [ 21498: 21501] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.304238 678849 task_exit.go:204] [ 21498: 21501] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.304360 678849 task_exit.go:204] [ 21498: 21505] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.305526 678849 task_exit.go:204] [ 21499: 21499] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.305900 678849 task_exit.go:204] [ 21499: 21499] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.306639 678849 task_exit.go:204] [ 21498: 21505] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.306703 678849 task_exit.go:204] [ 21498: 21505] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.306780 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.306870 678849 task_exit.go:204] [ 21498: 21498] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.307083 678849 task_signals.go:204] [ 21499: 21504] Signal 21499, PID: 21504, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.307237 678849 task_exit.go:204] [ 21499: 21504] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:04 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x6) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x6) (async) D0307 12:03:04.309568 678849 task_exit.go:204] [ 21499: 21504] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.309661 678849 task_exit.go:204] [ 21499: 21504] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.309758 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.310593 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.311039 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.311754 678849 task_exit.go:204] [ 21499: 21499] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.317473 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.317834 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.318933 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.319311 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.331244 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.333127 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.351423 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.351929 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.353134 678849 usertrap_amd64.go:212] [ 21496: 21496] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:04.353312 678849 usertrap_amd64.go:122] [ 21496: 21496] Allocate a new trap: 0xc00853b560 40 D0307 12:03:04.353459 678849 usertrap_amd64.go:225] [ 21496: 21496] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.365839 678849 usertrap_amd64.go:212] [ 21496: 21496] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.365918 678849 usertrap_amd64.go:122] [ 21496: 21496] Allocate a new trap: 0xc00853b560 41 D0307 12:03:04.365980 678849 usertrap_amd64.go:225] [ 21496: 21496] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:04.368177 678849 task_exit.go:204] [ 21496: 21496] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.368400 678849 task_signals.go:204] [ 21496: 21510] Signal 21496, PID: 21510, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.368443 678849 task_exit.go:204] [ 21496: 21496] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.368607 678849 task_exit.go:204] [ 21496: 21510] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.368999 678849 task_exit.go:204] [ 21496: 21510] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.369106 678849 task_exit.go:204] [ 21496: 21510] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.369298 678849 task_signals.go:204] [ 21496: 21506] Signal 21496, PID: 21506, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.369430 678849 task_signals.go:204] [ 21496: 21503] Signal 21496, PID: 21503, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.369610 678849 task_signals.go:204] [ 21496: 21509] Signal 21496, PID: 21509, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.369702 678849 task_exit.go:204] [ 21496: 21506] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.369841 678849 task_signals.go:204] [ 21496: 21507] Signal 21496, PID: 21507, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.369965 678849 task_exit.go:204] [ 21496: 21507] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.370148 678849 task_exit.go:204] [ 21496: 21506] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.370213 678849 task_exit.go:204] [ 21496: 21506] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.370391 678849 task_exit.go:204] [ 21496: 21507] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.370441 678849 task_exit.go:204] [ 21496: 21507] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.370500 678849 task_exit.go:204] [ 21496: 21503] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.370640 678849 task_exit.go:204] [ 21496: 21503] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.370675 678849 task_exit.go:204] [ 21496: 21503] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.370752 678849 task_exit.go:204] [ 21496: 21509] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.372709 678849 task_exit.go:204] [ 21496: 21509] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.372775 678849 task_exit.go:204] [ 21496: 21509] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.372841 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.373311 678849 task_exit.go:204] [ 21496: 21496] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="46294f0d78594036a0ae11a43c21b02e1a4557e398aab31ef8158e723f29fd531689dc0629d525c2eefc4a9fca8635d16f071a0a1c765274be021b647f75cf46860c7977e1fa5897c7a236a02d7a214160b39ae7a910682bb32b12c117ad265bb1", 0x61, r0) keyctl$link(0x8, r1, r0) (async, rerun: 64) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="eef6e6490a7ec1aab36af450712b86e5fe29ce9a3477ff5c4ef8e3897cb8d09e93404d27ecba5945ff9b", 0x2a, r0) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r3, 0x4, 0xc0, 0x7, 0x4e, 0x63, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x7800, 0x0, 0x1f}}) (rerun: 64) D0307 12:03:04.378188 678849 usertrap_amd64.go:212] [ 21508: 21508] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.378290 678849 usertrap_amd64.go:122] [ 21508: 21508] Allocate a new trap: 0xc008f96780 38 D0307 12:03:04.379362 678849 usertrap_amd64.go:225] [ 21508: 21508] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.381392 678849 usertrap_amd64.go:212] [ 21502: 21502] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.381457 678849 usertrap_amd64.go:122] [ 21502: 21502] Allocate a new trap: 0xc009cb3d70 40 D0307 12:03:04.381532 678849 usertrap_amd64.go:225] [ 21502: 21502] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.384835 678849 task_exit.go:204] [ 21502: 21502] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.385178 678849 task_exit.go:204] [ 21502: 21502] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.386768 678849 task_signals.go:204] [ 21502: 21511] Signal 21502, PID: 21511, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.386903 678849 task_exit.go:204] [ 21502: 21511] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.386943 678849 usertrap_amd64.go:212] [ 21508: 21508] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.387071 678849 usertrap_amd64.go:122] [ 21508: 21508] Allocate a new trap: 0xc008f96780 39 D0307 12:03:04.387299 678849 usertrap_amd64.go:225] [ 21508: 21508] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.388716 678849 task_exit.go:204] [ 21502: 21511] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.388780 678849 task_exit.go:204] [ 21502: 21511] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.388865 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.392713 678849 task_exit.go:204] [ 21502: 21502] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.395117 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.396385 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.396837 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.397188 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.399939 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.400280 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.405133 678849 usertrap_amd64.go:212] [ 21512: 21512] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.405256 678849 usertrap_amd64.go:122] [ 21512: 21512] Allocate a new trap: 0xc009cadd40 38 D0307 12:03:04.405647 678849 usertrap_amd64.go:225] [ 21512: 21512] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.407078 678849 usertrap_amd64.go:212] [ 21512: 21512] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.407126 678849 usertrap_amd64.go:122] [ 21512: 21512] Allocate a new trap: 0xc009cadd40 39 D0307 12:03:04.407200 678849 usertrap_amd64.go:225] [ 21512: 21512] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.408463 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.408725 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.421510 678849 usertrap_amd64.go:212] [ 21513: 21513] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:04.421626 678849 usertrap_amd64.go:122] [ 21513: 21513] Allocate a new trap: 0xc0007f3d70 38 D0307 12:03:04.422014 678849 usertrap_amd64.go:225] [ 21513: 21513] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:04.424181 678849 usertrap_amd64.go:212] [ 21513: 21513] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:04.424293 678849 usertrap_amd64.go:122] [ 21513: 21513] Allocate a new trap: 0xc0007f3d70 39 D0307 12:03:04.424387 678849 usertrap_amd64.go:225] [ 21513: 21513] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:04.425490 678849 usertrap_amd64.go:212] [ 21514: 21514] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.425555 678849 usertrap_amd64.go:122] [ 21514: 21514] Allocate a new trap: 0xc0012dd380 38 D0307 12:03:04.425844 678849 usertrap_amd64.go:225] [ 21514: 21514] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.427477 678849 usertrap_amd64.go:212] [ 21514: 21514] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.427547 678849 usertrap_amd64.go:122] [ 21514: 21514] Allocate a new trap: 0xc0012dd380 39 D0307 12:03:04.427623 678849 usertrap_amd64.go:225] [ 21514: 21514] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.427871 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.428480 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.429135 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.429442 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.452219 678849 usertrap_amd64.go:212] [ 21512: 21512] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.452402 678849 usertrap_amd64.go:122] [ 21512: 21512] Allocate a new trap: 0xc009cadd40 40 D0307 12:03:04.452522 678849 usertrap_amd64.go:225] [ 21512: 21512] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.453702 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.454054 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.460569 678849 usertrap_amd64.go:212] [ 21514: 21514] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.460671 678849 usertrap_amd64.go:122] [ 21514: 21514] Allocate a new trap: 0xc0012dd380 40 D0307 12:03:04.460788 678849 usertrap_amd64.go:225] [ 21514: 21514] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.462648 678849 task_exit.go:204] [ 21514: 21514] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.462852 678849 task_exit.go:204] [ 21514: 21514] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.463817 678849 task_signals.go:204] [ 21514: 21518] Signal 21514, PID: 21518, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.463957 678849 task_exit.go:204] [ 21514: 21518] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.464859 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.465193 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.465509 678849 task_exit.go:204] [ 21514: 21518] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.465523 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.465567 678849 task_exit.go:204] [ 21514: 21518] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.465632 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.465845 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.465922 678849 task_exit.go:204] [ 21514: 21514] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.466180 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.466504 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.467197 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.467600 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.468406 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.468668 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.468875 678849 usertrap_amd64.go:212] [ 21508: 21508] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:04.468979 678849 usertrap_amd64.go:122] [ 21508: 21508] Allocate a new trap: 0xc008f96780 40 D0307 12:03:04.469069 678849 usertrap_amd64.go:225] [ 21508: 21508] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.469626 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.469911 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.470524 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.470731 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.471704 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.471900 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.472162 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.472349 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.472635 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.472933 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.473499 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.473856 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.474280 678849 task_exit.go:204] [ 21512: 21512] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.474483 678849 task_signals.go:204] [ 21512: 21515] Signal 21512, PID: 21515, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.474643 678849 task_exit.go:204] [ 21512: 21512] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.474894 678849 task_exit.go:204] [ 21512: 21515] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.475384 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.475857 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.478096 678849 task_exit.go:204] [ 21512: 21515] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.478333 678849 task_exit.go:204] [ 21512: 21515] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.478427 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.478591 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.479121 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.479400 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.479552 678849 task_exit.go:204] [ 21512: 21512] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.479907 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.480131 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.480894 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.481539 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.482493 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.482977 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.489174 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.489464 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.489714 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.490084 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.492859 678849 usertrap_amd64.go:212] [ 21508: 21508] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.493076 678849 usertrap_amd64.go:122] [ 21508: 21508] Allocate a new trap: 0xc008f96780 41 D0307 12:03:04.493235 678849 usertrap_amd64.go:225] [ 21508: 21508] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:04.492932 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.493723 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.494024 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.494264 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.494704 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.494953 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.495783 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.496256 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.496516 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.496872 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.497204 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.497604 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.497976 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.498338 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.498556 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.499046 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.499324 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.499657 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.499877 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.500079 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.500285 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.500590 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.500833 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.501157 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.501650 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.501878 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.502059 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.502149 678849 task_exit.go:204] [ 21508: 21508] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.502282 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.502337 678849 task_signals.go:204] [ 21508: 21516] Signal 21508, PID: 21516, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.502353 678849 task_signals.go:204] [ 21508: 21520] Signal 21508, PID: 21520, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.502436 678849 task_signals.go:204] [ 21508: 21521] Signal 21508, PID: 21521, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.502463 678849 task_exit.go:204] [ 21508: 21516] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.502523 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.502605 678849 task_exit.go:204] [ 21508: 21520] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.502826 678849 task_exit.go:204] [ 21508: 21520] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.502874 678849 task_exit.go:204] [ 21508: 21520] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.502839 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.503011 678849 task_exit.go:204] [ 21508: 21521] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.503093 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.503251 678849 task_exit.go:204] [ 21508: 21508] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.503468 678849 task_exit.go:204] [ 21508: 21516] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.503508 678849 task_exit.go:204] [ 21508: 21516] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.507422 678849 task_exit.go:204] [ 21508: 21521] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.507514 678849 task_exit.go:204] [ 21508: 21521] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.507599 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.507849 678849 task_exit.go:204] [ 21508: 21508] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.508236 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.508619 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.509198 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.509470 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.509821 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.510121 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:04.510836 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.511109 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.511656 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.511870 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.512324 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.512505 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.513056 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.513345 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.515554 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.515904 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.518825 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.519149 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.519541 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.519863 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.520248 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.520578 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.520915 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.521209 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.522059 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.522262 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.522593 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.522840 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.523201 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.523517 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.526649 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.526960 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.527378 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.527673 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.528076 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.528351 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.528682 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.528929 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.529361 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.529574 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.529874 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.530105 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.530410 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.530621 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.530959 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.531243 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.531780 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.532064 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.532284 678849 usertrap_amd64.go:212] [ 21513: 21513] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:04.532439 678849 usertrap_amd64.go:122] [ 21513: 21513] Allocate a new trap: 0xc0007f3d70 40 D0307 12:03:04.532531 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.532555 678849 usertrap_amd64.go:225] [ 21513: 21513] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.533168 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.536364 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.536646 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.536932 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.537197 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.537526 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.537732 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.538003 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.538180 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.538451 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.538624 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.538976 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.539129 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.539587 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.539843 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.540201 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.540428 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.540752 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.540978 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.541288 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.541460 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.542116 678849 usertrap_amd64.go:212] [ 21513: 21513] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.542185 678849 usertrap_amd64.go:122] [ 21513: 21513] Allocate a new trap: 0xc0007f3d70 41 D0307 12:03:04.542268 678849 usertrap_amd64.go:225] [ 21513: 21513] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:04.545723 678849 usertrap_amd64.go:212] [ 21522: 21522] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.545931 678849 usertrap_amd64.go:122] [ 21522: 21522] Allocate a new trap: 0xc000346cf0 38 D0307 12:03:04.546410 678849 usertrap_amd64.go:225] [ 21522: 21522] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.550607 678849 usertrap_amd64.go:212] [ 21522: 21522] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.550673 678849 usertrap_amd64.go:122] [ 21522: 21522] Allocate a new trap: 0xc000346cf0 39 D0307 12:03:04.550764 678849 usertrap_amd64.go:225] [ 21522: 21522] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.551548 678849 task_exit.go:204] [ 21513: 21513] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.551714 678849 task_signals.go:204] [ 21513: 21519] Signal 21513, PID: 21519, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.551787 678849 task_signals.go:204] [ 21513: 21523] Signal 21513, PID: 21523, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.551828 678849 task_exit.go:204] [ 21513: 21519] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.551917 678849 task_exit.go:204] [ 21513: 21513] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.552121 678849 task_signals.go:204] [ 21513: 21517] Signal 21513, PID: 21517, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.552325 678849 task_exit.go:204] [ 21513: 21523] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.552575 678849 task_exit.go:204] [ 21513: 21523] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.552635 678849 task_exit.go:204] [ 21513: 21523] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.552738 678849 task_exit.go:204] [ 21513: 21517] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.552844 678849 task_exit.go:204] [ 21513: 21519] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.552897 678849 task_exit.go:204] [ 21513: 21519] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.553415 678849 usertrap_amd64.go:212] [ 21524: 21524] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.553503 678849 usertrap_amd64.go:122] [ 21524: 21524] Allocate a new trap: 0xc008f96990 38 D0307 12:03:04.554486 678849 usertrap_amd64.go:225] [ 21524: 21524] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.554767 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.555291 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.558274 678849 task_exit.go:204] [ 21513: 21517] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.558516 678849 task_exit.go:204] [ 21513: 21517] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.558654 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.559615 678849 task_exit.go:204] [ 21513: 21513] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 3: socket$inet6(0xa, 0x6, 0x4) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max.burst\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) D0307 12:03:04.561869 678849 usertrap_amd64.go:212] [ 21524: 21524] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.561933 678849 usertrap_amd64.go:122] [ 21524: 21524] Allocate a new trap: 0xc008f96990 39 D0307 12:03:04.561992 678849 usertrap_amd64.go:225] [ 21524: 21524] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.564108 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.564470 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.567877 678849 usertrap_amd64.go:212] [ 21525: 21525] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.568104 678849 usertrap_amd64.go:122] [ 21525: 21525] Allocate a new trap: 0xc007f55f50 38 D0307 12:03:04.568547 678849 usertrap_amd64.go:225] [ 21525: 21525] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.569689 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.570196 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.591089 678849 usertrap_amd64.go:212] [ 21525: 21525] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.591169 678849 usertrap_amd64.go:122] [ 21525: 21525] Allocate a new trap: 0xc007f55f50 39 D0307 12:03:04.591228 678849 usertrap_amd64.go:225] [ 21525: 21525] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.594236 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.594598 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.604293 678849 usertrap_amd64.go:212] [ 21522: 21522] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.604381 678849 usertrap_amd64.go:122] [ 21522: 21522] Allocate a new trap: 0xc000346cf0 40 D0307 12:03:04.604457 678849 usertrap_amd64.go:225] [ 21522: 21522] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.604882 678849 usertrap_amd64.go:212] [ 21527: 21527] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:04.605038 678849 usertrap_amd64.go:122] [ 21527: 21527] Allocate a new trap: 0xc006676660 38 D0307 12:03:04.605790 678849 usertrap_amd64.go:225] [ 21527: 21527] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:04.607249 678849 task_exit.go:204] [ 21522: 21522] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.607371 678849 task_signals.go:204] [ 21522: 21526] Signal 21522, PID: 21526, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.607433 678849 task_exit.go:204] [ 21522: 21522] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.607512 678849 task_exit.go:204] [ 21522: 21526] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.608626 678849 usertrap_amd64.go:212] [ 21527: 21527] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:04.608686 678849 usertrap_amd64.go:122] [ 21527: 21527] Allocate a new trap: 0xc006676660 39 D0307 12:03:04.608754 678849 usertrap_amd64.go:225] [ 21527: 21527] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:04.610463 678849 task_exit.go:204] [ 21522: 21526] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.610535 678849 task_exit.go:204] [ 21522: 21526] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.610649 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.611499 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.611733 678849 task_exit.go:204] [ 21522: 21522] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.611799 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.618338 678849 usertrap_amd64.go:212] [ 21524: 21524] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.618449 678849 usertrap_amd64.go:122] [ 21524: 21524] Allocate a new trap: 0xc008f96990 40 D0307 12:03:04.618506 678849 usertrap_amd64.go:225] [ 21524: 21524] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.621671 678849 task_exit.go:204] [ 21524: 21524] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.622151 678849 task_exit.go:204] [ 21524: 21524] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.622836 678849 task_signals.go:204] [ 21524: 21528] Signal 21524, PID: 21528, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.623309 678849 task_exit.go:204] [ 21524: 21528] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.626610 678849 task_exit.go:204] [ 21524: 21528] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.626688 678849 task_exit.go:204] [ 21524: 21528] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.626797 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.627887 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.630062 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.630074 678849 task_exit.go:204] [ 21524: 21524] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.639237 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.640648 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.642420 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.644019 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.646990 678849 usertrap_amd64.go:212] [ 21525: 21525] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.647069 678849 usertrap_amd64.go:122] [ 21525: 21525] Allocate a new trap: 0xc007f55f50 40 D0307 12:03:04.647132 678849 usertrap_amd64.go:225] [ 21525: 21525] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.651129 678849 task_exit.go:204] [ 21525: 21525] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.651250 678849 task_signals.go:204] [ 21525: 21530] Signal 21525, PID: 21530, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.651333 678849 task_exit.go:204] [ 21525: 21525] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.651597 678849 task_exit.go:204] [ 21525: 21530] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.654066 678849 task_exit.go:204] [ 21525: 21530] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.654131 678849 task_exit.go:204] [ 21525: 21530] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.654247 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.655838 678849 task_exit.go:204] [ 21525: 21525] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) (async) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) (async) D0307 12:03:04.658747 678849 usertrap_amd64.go:212] [ 21532: 21532] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.658855 678849 usertrap_amd64.go:122] [ 21532: 21532] Allocate a new trap: 0xc008f96ae0 38 D0307 12:03:04.659218 678849 usertrap_amd64.go:225] [ 21532: 21532] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.662531 678849 usertrap_amd64.go:212] [ 21532: 21532] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.662602 678849 usertrap_amd64.go:122] [ 21532: 21532] Allocate a new trap: 0xc008f96ae0 39 D0307 12:03:04.662696 678849 usertrap_amd64.go:225] [ 21532: 21532] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.665221 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.665587 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.665853 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.666152 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.666365 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.666755 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.681197 678849 usertrap_amd64.go:212] [ 21527: 21527] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.681278 678849 usertrap_amd64.go:122] [ 21527: 21527] Allocate a new trap: 0xc006676660 40 D0307 12:03:04.681346 678849 usertrap_amd64.go:225] [ 21527: 21527] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.684127 678849 task_exit.go:204] [ 21527: 21527] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.684570 678849 task_exit.go:204] [ 21527: 21527] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.685240 678849 task_signals.go:204] [ 21527: 21529] Signal 21527, PID: 21529, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.685332 678849 task_exit.go:204] [ 21527: 21529] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.687923 678849 task_exit.go:204] [ 21527: 21529] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.688213 678849 task_exit.go:204] [ 21527: 21529] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.688372 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.691191 678849 usertrap_amd64.go:212] [ 21531: 21531] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.691308 678849 usertrap_amd64.go:122] [ 21531: 21531] Allocate a new trap: 0xc007c7a390 38 D0307 12:03:04.692432 678849 usertrap_amd64.go:225] [ 21531: 21531] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.693991 678849 task_exit.go:204] [ 21527: 21527] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 3: socket$inet6(0xa, 0x6, 0x4) (async, rerun: 64) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (rerun: 64) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max.burst\x00', 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) D0307 12:03:04.701055 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.701546 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.702445 678849 usertrap_amd64.go:212] [ 21531: 21531] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.702561 678849 usertrap_amd64.go:122] [ 21531: 21531] Allocate a new trap: 0xc007c7a390 39 D0307 12:03:04.702635 678849 usertrap_amd64.go:225] [ 21531: 21531] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.704065 678849 usertrap_amd64.go:212] [ 21532: 21532] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.704181 678849 usertrap_amd64.go:122] [ 21532: 21532] Allocate a new trap: 0xc008f96ae0 40 D0307 12:03:04.704266 678849 usertrap_amd64.go:225] [ 21532: 21532] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.705050 678849 usertrap_amd64.go:212] [ 21533: 21533] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.705177 678849 usertrap_amd64.go:122] [ 21533: 21533] Allocate a new trap: 0xc0069801b0 38 D0307 12:03:04.705676 678849 usertrap_amd64.go:225] [ 21533: 21533] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.705807 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.706165 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.706555 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.706866 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.707259 678849 task_exit.go:204] [ 21532: 21532] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.707534 678849 task_signals.go:204] [ 21532: 21534] Signal 21532, PID: 21534, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.707577 678849 task_exit.go:204] [ 21532: 21532] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.709380 678849 task_exit.go:204] [ 21532: 21534] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.709476 678849 usertrap_amd64.go:212] [ 21533: 21533] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.709554 678849 usertrap_amd64.go:122] [ 21533: 21533] Allocate a new trap: 0xc0069801b0 39 D0307 12:03:04.709637 678849 usertrap_amd64.go:225] [ 21533: 21533] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.711865 678849 task_exit.go:204] [ 21532: 21534] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.711928 678849 task_exit.go:204] [ 21532: 21534] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.711998 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.712042 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.712931 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.712982 678849 task_exit.go:204] [ 21532: 21532] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.738570 678849 usertrap_amd64.go:212] [ 21535: 21535] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:04.738687 678849 usertrap_amd64.go:122] [ 21535: 21535] Allocate a new trap: 0xc0012dddd0 38 D0307 12:03:04.739218 678849 usertrap_amd64.go:225] [ 21535: 21535] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:04.744362 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.745289 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.754465 678849 usertrap_amd64.go:212] [ 21535: 21535] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:04.754626 678849 usertrap_amd64.go:122] [ 21535: 21535] Allocate a new trap: 0xc0012dddd0 39 D0307 12:03:04.754749 678849 usertrap_amd64.go:225] [ 21535: 21535] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:04.757385 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.757979 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.765858 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.766132 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.769996 678849 usertrap_amd64.go:212] [ 21531: 21531] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.770121 678849 usertrap_amd64.go:122] [ 21531: 21531] Allocate a new trap: 0xc007c7a390 40 D0307 12:03:04.770249 678849 usertrap_amd64.go:225] [ 21531: 21531] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.773592 678849 task_exit.go:204] [ 21531: 21531] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.773748 678849 task_signals.go:204] [ 21531: 21536] Signal 21531, PID: 21536, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.773821 678849 task_exit.go:204] [ 21531: 21536] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.774086 678849 task_exit.go:204] [ 21531: 21536] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.774140 678849 task_exit.go:204] [ 21531: 21536] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.775936 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.775998 678849 task_exit.go:204] [ 21531: 21531] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.776177 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.776342 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.776509 678849 task_exit.go:204] [ 21531: 21531] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.781863 678849 usertrap_amd64.go:212] [ 21537: 21537] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.782014 678849 usertrap_amd64.go:122] [ 21537: 21537] Allocate a new trap: 0xc0012dde00 38 D0307 12:03:04.782572 678849 usertrap_amd64.go:225] [ 21537: 21537] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.783078 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.783332 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.784535 678849 usertrap_amd64.go:212] [ 21537: 21537] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.784650 678849 usertrap_amd64.go:122] [ 21537: 21537] Allocate a new trap: 0xc0012dde00 39 D0307 12:03:04.784749 678849 usertrap_amd64.go:225] [ 21537: 21537] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.792387 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.792659 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.793053 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.793310 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.796312 678849 usertrap_amd64.go:212] [ 21533: 21533] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:04.796379 678849 usertrap_amd64.go:122] [ 21533: 21533] Allocate a new trap: 0xc0069801b0 40 D0307 12:03:04.796438 678849 usertrap_amd64.go:225] [ 21533: 21533] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.813445 678849 usertrap_amd64.go:212] [ 21533: 21533] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.813499 678849 usertrap_amd64.go:122] [ 21533: 21533] Allocate a new trap: 0xc0069801b0 41 D0307 12:03:04.813573 678849 usertrap_amd64.go:225] [ 21533: 21533] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:04.816343 678849 task_exit.go:204] [ 21533: 21533] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.816614 678849 task_exit.go:204] [ 21533: 21533] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.818871 678849 task_signals.go:204] [ 21533: 21539] Signal 21533, PID: 21539, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.818927 678849 task_signals.go:204] [ 21533: 21538] Signal 21533, PID: 21538, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.818952 678849 task_exit.go:204] [ 21533: 21539] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.819116 678849 task_signals.go:204] [ 21533: 21540] Signal 21533, PID: 21540, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.819168 678849 task_exit.go:204] [ 21533: 21538] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.819377 678849 task_exit.go:204] [ 21533: 21538] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.819437 678849 task_exit.go:204] [ 21533: 21538] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.819546 678849 task_exit.go:204] [ 21533: 21540] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.819905 678849 task_exit.go:204] [ 21533: 21540] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.819953 678849 task_exit.go:204] [ 21533: 21540] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.821980 678849 task_exit.go:204] [ 21533: 21539] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.822043 678849 task_exit.go:204] [ 21533: 21539] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.822140 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.825609 678849 task_exit.go:204] [ 21533: 21533] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) (async) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) (async) D0307 12:03:04.830329 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.830639 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.831332 678849 usertrap_amd64.go:212] [ 21537: 21537] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.831393 678849 usertrap_amd64.go:122] [ 21537: 21537] Allocate a new trap: 0xc0012dde00 40 D0307 12:03:04.831492 678849 usertrap_amd64.go:225] [ 21537: 21537] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.832881 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.833191 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.834529 678849 task_exit.go:204] [ 21537: 21537] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.834667 678849 task_signals.go:204] [ 21537: 21543] Signal 21537, PID: 21543, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.834734 678849 task_exit.go:204] [ 21537: 21543] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.834855 678849 task_exit.go:204] [ 21537: 21537] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.838265 678849 task_exit.go:204] [ 21537: 21543] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.838350 678849 task_exit.go:204] [ 21537: 21543] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.838543 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.838702 678849 task_exit.go:204] [ 21537: 21537] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:04.843005 678849 usertrap_amd64.go:212] [ 21541: 21541] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.843117 678849 usertrap_amd64.go:122] [ 21541: 21541] Allocate a new trap: 0xc001430270 38 D0307 12:03:04.843502 678849 usertrap_amd64.go:225] [ 21541: 21541] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.845552 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.845967 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.846476 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.846830 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.849133 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.849483 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.850685 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.850919 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.851237 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.851481 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.851510 678849 usertrap_amd64.go:212] [ 21541: 21541] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.851729 678849 usertrap_amd64.go:122] [ 21541: 21541] Allocate a new trap: 0xc001430270 39 D0307 12:03:04.851801 678849 usertrap_amd64.go:225] [ 21541: 21541] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.851977 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.852232 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.852566 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.852866 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.853278 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.853516 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.853792 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.854006 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.854331 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.854624 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.854880 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.855106 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.855530 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.855987 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.856269 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.857043 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.857477 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.857765 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.861163 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.862422 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.862917 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.863204 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.863540 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.863841 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.864272 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.864546 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.864849 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.865128 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.865499 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.865863 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.866193 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.866431 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.866834 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.867608 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.867872 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.868046 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.870468 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.871709 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.872290 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.872588 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.873053 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.873369 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.873427 678849 usertrap_amd64.go:212] [ 21545: 21545] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:04.873536 678849 usertrap_amd64.go:122] [ 21545: 21545] Allocate a new trap: 0xc0012ddec0 38 D0307 12:03:04.873732 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.873934 678849 usertrap_amd64.go:225] [ 21545: 21545] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:04.874038 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.874426 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.874743 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.875146 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.875452 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.875162 678849 usertrap_amd64.go:212] [ 21541: 21541] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.875680 678849 usertrap_amd64.go:122] [ 21541: 21541] Allocate a new trap: 0xc001430270 40 D0307 12:03:04.875763 678849 usertrap_amd64.go:225] [ 21541: 21541] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.876065 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.876361 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.876775 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.876815 678849 usertrap_amd64.go:212] [ 21545: 21545] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:04.876885 678849 usertrap_amd64.go:122] [ 21545: 21545] Allocate a new trap: 0xc0012ddec0 39 D0307 12:03:04.876985 678849 usertrap_amd64.go:225] [ 21545: 21545] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:04.877135 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.877470 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.877872 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.878191 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.879446 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.879810 678849 task_exit.go:204] [ 21541: 21541] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.879981 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.879999 678849 task_signals.go:204] [ 21541: 21547] Signal 21541, PID: 21547, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.880107 678849 task_exit.go:204] [ 21541: 21547] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.880556 678849 task_exit.go:204] [ 21541: 21547] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.880599 678849 task_exit.go:204] [ 21541: 21547] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.880797 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.882469 678849 task_exit.go:204] [ 21541: 21541] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.882576 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.883444 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.883728 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.885098 678849 task_exit.go:204] [ 21541: 21541] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.885810 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:04.886229 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.886537 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.886842 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.886996 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.887339 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.887790 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.888072 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.888502 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.890304 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.890559 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.890917 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.891236 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.891297 678849 usertrap_amd64.go:212] [ 21548: 21548] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:04.891367 678849 usertrap_amd64.go:122] [ 21548: 21548] Allocate a new trap: 0xc006676ab0 38 D0307 12:03:04.891887 678849 usertrap_amd64.go:225] [ 21548: 21548] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:04.892202 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.892444 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.892777 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.894331 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.894637 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.895140 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.895472 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.895838 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.896139 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.896597 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.897015 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.897495 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.897823 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.897869 678849 usertrap_amd64.go:212] [ 21535: 21535] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:04.897979 678849 usertrap_amd64.go:122] [ 21535: 21535] Allocate a new trap: 0xc0012dddd0 40 D0307 12:03:04.898043 678849 usertrap_amd64.go:225] [ 21535: 21535] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:04.898196 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.898482 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.902250 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.902588 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.903121 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.903343 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.903719 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.904048 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.904369 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.904699 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.905110 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.905400 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.905672 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.905902 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.906248 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.906491 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.906809 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.907047 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.907307 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.907532 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.907767 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.908020 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.908267 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.908534 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.909009 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.909266 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.909518 678849 usertrap_amd64.go:212] [ 21548: 21548] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:04.909640 678849 usertrap_amd64.go:122] [ 21548: 21548] Allocate a new trap: 0xc006676ab0 39 D0307 12:03:04.909718 678849 usertrap_amd64.go:225] [ 21548: 21548] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:04.910971 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.911351 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.911751 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.912005 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.912329 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.912548 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.912770 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:04.913078 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.913880 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.914382 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.914639 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.914898 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.915236 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.915559 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.915591 678849 usertrap_amd64.go:212] [ 21549: 21549] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:04.915705 678849 usertrap_amd64.go:122] [ 21549: 21549] Allocate a new trap: 0xc0076b3260 38 D0307 12:03:04.916135 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.916196 678849 usertrap_amd64.go:225] [ 21549: 21549] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:04.916417 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.916726 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.916928 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.917198 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.917439 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.918714 678849 usertrap_amd64.go:212] [ 21535: 21535] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:04.918768 678849 usertrap_amd64.go:122] [ 21535: 21535] Allocate a new trap: 0xc0012dddd0 41 D0307 12:03:04.918826 678849 usertrap_amd64.go:225] [ 21535: 21535] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:04.923937 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.924291 678849 task_exit.go:204] [ 21535: 21535] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.924466 678849 task_signals.go:204] [ 21535: 21544] Signal 21535, PID: 21544, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.924295 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.924561 678849 task_exit.go:204] [ 21535: 21535] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.924768 678849 task_signals.go:204] [ 21535: 21542] Signal 21535, PID: 21542, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.924965 678849 task_exit.go:204] [ 21535: 21542] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.925076 678849 task_signals.go:204] [ 21535: 21546] Signal 21535, PID: 21546, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.925179 678849 task_exit.go:204] [ 21535: 21546] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.925402 678849 task_exit.go:204] [ 21535: 21546] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.925465 678849 task_exit.go:204] [ 21535: 21546] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.925615 678849 task_exit.go:204] [ 21535: 21542] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.925667 678849 task_exit.go:204] [ 21535: 21542] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.925772 678849 task_exit.go:204] [ 21535: 21544] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.928979 678849 task_exit.go:204] [ 21535: 21544] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.929046 678849 task_exit.go:204] [ 21535: 21544] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.929150 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:04.932133 678849 task_exit.go:204] [ 21535: 21535] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.933457 678849 usertrap_amd64.go:212] [ 21549: 21549] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:04.933525 678849 usertrap_amd64.go:122] [ 21549: 21549] Allocate a new trap: 0xc0076b3260 39 D0307 12:03:04.933604 678849 usertrap_amd64.go:225] [ 21549: 21549] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:04.937230 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} 12:03:04 executing program 3: socket$inet6(0xa, 0x6, 0x4) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max.burst\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) socket$inet6(0xa, 0x6, 0x4) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max.burst\x00', 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) (async) D0307 12:03:04.940294 678849 usertrap_amd64.go:212] [ 21545: 21545] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:04.940373 678849 usertrap_amd64.go:122] [ 21545: 21545] Allocate a new trap: 0xc0012ddec0 40 D0307 12:03:04.940428 678849 usertrap_amd64.go:225] [ 21545: 21545] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:04.947218 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.951706 678849 usertrap_amd64.go:212] [ 21545: 21545] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:04.951863 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.951926 678849 usertrap_amd64.go:122] [ 21545: 21545] Allocate a new trap: 0xc0012ddec0 41 D0307 12:03:04.952016 678849 usertrap_amd64.go:225] [ 21545: 21545] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:04.952314 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.954396 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.954704 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.955822 678849 usertrap_amd64.go:212] [ 21548: 21548] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:04.955902 678849 usertrap_amd64.go:122] [ 21548: 21548] Allocate a new trap: 0xc006676ab0 40 D0307 12:03:04.955982 678849 usertrap_amd64.go:225] [ 21548: 21548] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:04.956513 678849 task_exit.go:204] [ 21545: 21545] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.956657 678849 task_signals.go:204] [ 21545: 21550] Signal 21545, PID: 21550, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.956687 678849 task_signals.go:204] [ 21545: 21551] Signal 21545, PID: 21551, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.956741 678849 task_signals.go:204] [ 21545: 21553] Signal 21545, PID: 21553, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.956771 678849 task_signals.go:204] [ 21545: 21552] Signal 21545, PID: 21552, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.956865 678849 task_exit.go:204] [ 21545: 21550] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.957176 678849 task_exit.go:204] [ 21545: 21551] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.957397 678849 task_exit.go:204] [ 21545: 21553] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.957579 678849 task_exit.go:204] [ 21545: 21552] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.957836 678849 task_exit.go:204] [ 21545: 21552] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.957893 678849 task_exit.go:204] [ 21545: 21552] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.959082 678849 task_exit.go:204] [ 21545: 21545] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.959500 678849 task_exit.go:204] [ 21545: 21550] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.959599 678849 task_exit.go:204] [ 21545: 21550] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.959735 678849 task_exit.go:204] [ 21545: 21551] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.959792 678849 task_exit.go:204] [ 21545: 21551] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.960197 678849 task_exit.go:204] [ 21545: 21553] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.960275 678849 task_exit.go:204] [ 21545: 21553] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.960360 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:04.961419 678849 task_exit.go:204] [ 21545: 21545] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.963490 678849 task_exit.go:204] [ 21548: 21548] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.963739 678849 task_signals.go:204] [ 21548: 21554] Signal 21548, PID: 21554, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.963831 678849 task_exit.go:204] [ 21548: 21548] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.965586 678849 task_exit.go:204] [ 21548: 21554] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.968285 678849 task_exit.go:204] [ 21548: 21554] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.968339 678849 task_exit.go:204] [ 21548: 21554] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.968451 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:04.968566 678849 task_exit.go:204] [ 21548: 21548] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x81, 0x1f, 0x1f, 0x0, 0x6, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0x43b, 0x5}, 0x80, 0x9, 0x8, 0x0, 0x0, 0x101, 0x800, 0x0, 0x40, 0x0, 0x54f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) socketpair(0x1a, 0x80000, 0xfffffff7, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="560000007d0100000040000010000020020000000500015ff0aef900000000000000000008000000000500000007000000000000000200242d07002e7b2e402d299b000004003a27", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32], 0x56) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RVERSION(r3, &(0x7f00000001c0)={0x13, 0x65, 0xffff, 0x4, 0x6, '9P2000'}, 0x13) 12:03:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) D0307 12:03:04.982782 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.983122 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.985268 678849 usertrap_amd64.go:212] [ 21549: 21549] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:04.985336 678849 usertrap_amd64.go:122] [ 21549: 21549] Allocate a new trap: 0xc0076b3260 40 D0307 12:03:04.985427 678849 usertrap_amd64.go:225] [ 21549: 21549] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:04.987638 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:04.988019 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:04.988495 678849 task_exit.go:204] [ 21549: 21549] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.988726 678849 task_exit.go:204] [ 21549: 21549] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.989148 678849 task_signals.go:204] [ 21549: 21555] Signal 21549, PID: 21555, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:04.989297 678849 task_exit.go:204] [ 21549: 21555] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:04.992545 678849 task_exit.go:204] [ 21549: 21555] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:04.992643 678849 task_exit.go:204] [ 21549: 21555] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:04.992763 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:04.993697 678849 task_exit.go:204] [ 21549: 21549] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:05.005254 678849 usertrap_amd64.go:212] [ 21556: 21556] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.005353 678849 usertrap_amd64.go:122] [ 21556: 21556] Allocate a new trap: 0xc0015da330 38 D0307 12:03:05.006990 678849 usertrap_amd64.go:225] [ 21556: 21556] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.007843 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.009207 678849 usertrap_amd64.go:212] [ 21556: 21556] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.009273 678849 usertrap_amd64.go:122] [ 21556: 21556] Allocate a new trap: 0xc0015da330 39 D0307 12:03:05.009381 678849 usertrap_amd64.go:225] [ 21556: 21556] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.013306 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.013586 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.013889 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.030065 678849 usertrap_amd64.go:212] [ 21558: 21558] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.030228 678849 usertrap_amd64.go:122] [ 21558: 21558] Allocate a new trap: 0xc001430480 38 D0307 12:03:05.031434 678849 usertrap_amd64.go:225] [ 21558: 21558] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.034832 678849 usertrap_amd64.go:212] [ 21558: 21558] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.034961 678849 usertrap_amd64.go:122] [ 21558: 21558] Allocate a new trap: 0xc001430480 39 D0307 12:03:05.035057 678849 usertrap_amd64.go:225] [ 21558: 21558] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.035193 678849 usertrap_amd64.go:212] [ 21557: 21557] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.035301 678849 usertrap_amd64.go:122] [ 21557: 21557] Allocate a new trap: 0xc000929d70 38 D0307 12:03:05.035689 678849 usertrap_amd64.go:225] [ 21557: 21557] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.038284 678849 usertrap_amd64.go:212] [ 21557: 21557] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.038390 678849 usertrap_amd64.go:122] [ 21557: 21557] Allocate a new trap: 0xc000929d70 39 D0307 12:03:05.038476 678849 usertrap_amd64.go:225] [ 21557: 21557] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.039129 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.039630 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.041588 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.042124 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.046768 678849 usertrap_amd64.go:212] [ 21559: 21559] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.046866 678849 usertrap_amd64.go:122] [ 21559: 21559] Allocate a new trap: 0xc009004090 38 D0307 12:03:05.047286 678849 usertrap_amd64.go:225] [ 21559: 21559] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:05.054130 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.054491 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.064834 678849 usertrap_amd64.go:212] [ 21557: 21557] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.064926 678849 usertrap_amd64.go:122] [ 21557: 21557] Allocate a new trap: 0xc000929d70 40 D0307 12:03:05.065058 678849 usertrap_amd64.go:225] [ 21557: 21557] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.065146 678849 usertrap_amd64.go:212] [ 21559: 21559] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.065243 678849 usertrap_amd64.go:122] [ 21559: 21559] Allocate a new trap: 0xc009004090 39 D0307 12:03:05.065303 678849 usertrap_amd64.go:225] [ 21559: 21559] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.066760 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.067121 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.068794 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.069111 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.069828 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.070135 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.072870 678849 usertrap_amd64.go:212] [ 21556: 21556] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:05.073050 678849 usertrap_amd64.go:122] [ 21556: 21556] Allocate a new trap: 0xc0015da330 40 D0307 12:03:05.073240 678849 usertrap_amd64.go:225] [ 21556: 21556] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:05.077012 678849 usertrap_amd64.go:212] [ 21558: 21558] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.077226 678849 usertrap_amd64.go:122] [ 21558: 21558] Allocate a new trap: 0xc001430480 40 D0307 12:03:05.077328 678849 usertrap_amd64.go:225] [ 21558: 21558] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.078188 678849 task_exit.go:204] [ 21557: 21557] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.078493 678849 task_exit.go:204] [ 21557: 21557] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.078914 678849 task_signals.go:204] [ 21557: 21561] Signal 21557, PID: 21561, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.079019 678849 task_exit.go:204] [ 21557: 21561] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.080902 678849 task_exit.go:204] [ 21557: 21561] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.080997 678849 task_exit.go:204] [ 21557: 21561] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.081069 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.083705 678849 task_exit.go:204] [ 21557: 21557] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.085417 678849 usertrap_amd64.go:212] [ 21556: 21556] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:05.085521 678849 usertrap_amd64.go:122] [ 21556: 21556] Allocate a new trap: 0xc0015da330 41 D0307 12:03:05.085608 678849 usertrap_amd64.go:225] [ 21556: 21556] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:05.086216 678849 task_exit.go:204] [ 21558: 21558] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.086476 678849 task_signals.go:204] [ 21558: 21562] Signal 21558, PID: 21562, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.086551 678849 task_exit.go:204] [ 21558: 21558] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.086840 678849 task_exit.go:204] [ 21558: 21562] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.088390 678849 task_exit.go:204] [ 21558: 21562] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.088449 678849 task_exit.go:204] [ 21558: 21562] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.088519 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 12:03:05 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x81, 0x1f, 0x1f, 0x0, 0x6, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0x43b, 0x5}, 0x80, 0x9, 0x8, 0x0, 0x0, 0x101, 0x800, 0x0, 0x40, 0x0, 0x54f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x81, 0x1f, 0x1f, 0x0, 0x6, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0x43b, 0x5}, 0x80, 0x9, 0x8, 0x0, 0x0, 0x101, 0x800, 0x0, 0x40, 0x0, 0x54f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) socketpair(0x1a, 0x80000, 0xfffffff7, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="560000007d0100000040000010000020020000000500015ff0aef900000000000000000008000000000500000007000000000000000200242d07002e7b2e402d299b000004003a27", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32], 0x56) pipe2$9p(&(0x7f0000000180), 0x84800) (async) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RVERSION(r3, &(0x7f00000001c0)={0x13, 0x65, 0xffff, 0x4, 0x6, '9P2000'}, 0x13) D0307 12:03:05.089334 678849 task_exit.go:204] [ 21558: 21558] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 2: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.098082 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.098704 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.099475 678849 task_exit.go:204] [ 21556: 21556] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.099615 678849 task_signals.go:204] [ 21556: 21565] Signal 21556, PID: 21565, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.099681 678849 task_exit.go:204] [ 21556: 21556] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.099998 678849 task_signals.go:204] [ 21556: 21560] Signal 21556, PID: 21560, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.100094 678849 task_exit.go:204] [ 21556: 21560] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.100469 678849 task_exit.go:204] [ 21556: 21560] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.100543 678849 task_exit.go:204] [ 21556: 21560] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.100698 678849 task_exit.go:204] [ 21556: 21565] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.100935 678849 task_exit.go:204] [ 21556: 21565] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.101039 678849 task_exit.go:204] [ 21556: 21565] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.101230 678849 task_signals.go:204] [ 21556: 21563] Signal 21556, PID: 21563, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.101328 678849 task_exit.go:204] [ 21556: 21563] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.101518 678849 task_exit.go:204] [ 21556: 21563] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.101563 678849 task_exit.go:204] [ 21556: 21563] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.102666 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.102415 678849 task_signals.go:204] [ 21556: 21564] Signal 21556, PID: 21564, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.103078 678849 task_exit.go:204] [ 21556: 21564] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.104676 678849 usertrap_amd64.go:212] [ 21559: 21559] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.104856 678849 usertrap_amd64.go:122] [ 21559: 21559] Allocate a new trap: 0xc009004090 40 D0307 12:03:05.105011 678849 usertrap_amd64.go:225] [ 21559: 21559] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.105690 678849 task_exit.go:204] [ 21556: 21564] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.105771 678849 task_exit.go:204] [ 21556: 21564] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.105844 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:05.106364 678849 task_exit.go:204] [ 21556: 21556] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.107305 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.121014 678849 task_exit.go:204] [ 21559: 21559] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.121239 678849 task_signals.go:204] [ 21559: 21566] Signal 21559, PID: 21566, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.121421 678849 task_exit.go:204] [ 21559: 21566] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.121690 678849 task_exit.go:204] [ 21559: 21559] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.124933 678849 task_exit.go:204] [ 21559: 21566] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.125048 678849 task_exit.go:204] [ 21559: 21566] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.125168 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.125288 678849 task_exit.go:204] [ 21559: 21559] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.127121 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.127498 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:05.129777 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.130089 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.130459 678849 usertrap_amd64.go:212] [ 21567: 21567] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.130521 678849 usertrap_amd64.go:122] [ 21567: 21567] Allocate a new trap: 0xc003d707b0 38 D0307 12:03:05.130908 678849 usertrap_amd64.go:225] [ 21567: 21567] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.132730 678849 usertrap_amd64.go:212] [ 21567: 21567] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.132790 678849 usertrap_amd64.go:122] [ 21567: 21567] Allocate a new trap: 0xc003d707b0 39 D0307 12:03:05.132863 678849 usertrap_amd64.go:225] [ 21567: 21567] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.134839 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.135185 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.155965 678849 usertrap_amd64.go:212] [ 21568: 21568] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.156087 678849 usertrap_amd64.go:122] [ 21568: 21568] Allocate a new trap: 0xc0037f16b0 38 D0307 12:03:05.156481 678849 usertrap_amd64.go:225] [ 21568: 21568] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.158542 678849 usertrap_amd64.go:212] [ 21568: 21568] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.158626 678849 usertrap_amd64.go:122] [ 21568: 21568] Allocate a new trap: 0xc0037f16b0 39 D0307 12:03:05.158800 678849 usertrap_amd64.go:225] [ 21568: 21568] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.164225 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.164666 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.164836 678849 usertrap_amd64.go:212] [ 21569: 21569] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.164936 678849 usertrap_amd64.go:122] [ 21569: 21569] Allocate a new trap: 0xc001430570 38 D0307 12:03:05.165308 678849 usertrap_amd64.go:225] [ 21569: 21569] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.167875 678849 usertrap_amd64.go:212] [ 21569: 21569] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.168021 678849 usertrap_amd64.go:122] [ 21569: 21569] Allocate a new trap: 0xc001430570 39 D0307 12:03:05.168108 678849 usertrap_amd64.go:225] [ 21569: 21569] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.170358 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.171083 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.173724 678849 usertrap_amd64.go:212] [ 21570: 21570] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.173892 678849 usertrap_amd64.go:122] [ 21570: 21570] Allocate a new trap: 0xc003d708d0 38 D0307 12:03:05.174281 678849 usertrap_amd64.go:225] [ 21570: 21570] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:05.195370 678849 usertrap_amd64.go:212] [ 21567: 21567] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.195463 678849 usertrap_amd64.go:122] [ 21567: 21567] Allocate a new trap: 0xc003d707b0 40 D0307 12:03:05.195536 678849 usertrap_amd64.go:225] [ 21567: 21567] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.196480 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.197172 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.198327 678849 task_exit.go:204] [ 21567: 21567] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.198487 678849 task_signals.go:204] [ 21567: 21572] Signal 21567, PID: 21572, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.198592 678849 task_exit.go:204] [ 21567: 21572] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.198901 678849 task_signals.go:204] [ 21567: 21571] Signal 21567, PID: 21571, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.198916 678849 task_exit.go:204] [ 21567: 21567] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.199398 678849 task_exit.go:204] [ 21567: 21572] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.199500 678849 task_exit.go:204] [ 21567: 21572] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.212783 678849 usertrap_amd64.go:212] [ 21570: 21570] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.212986 678849 usertrap_amd64.go:122] [ 21570: 21570] Allocate a new trap: 0xc003d708d0 39 D0307 12:03:05.213167 678849 usertrap_amd64.go:225] [ 21570: 21570] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.214881 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.215347 678849 task_exit.go:204] [ 21567: 21571] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.215514 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.217792 678849 task_exit.go:204] [ 21567: 21571] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.217973 678849 task_exit.go:204] [ 21567: 21571] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.218170 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.219263 678849 usertrap_amd64.go:212] [ 21568: 21568] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.219324 678849 usertrap_amd64.go:122] [ 21568: 21568] Allocate a new trap: 0xc0037f16b0 40 D0307 12:03:05.219382 678849 usertrap_amd64.go:225] [ 21568: 21568] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.221079 678849 task_exit.go:204] [ 21567: 21567] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x81, 0x1f, 0x1f, 0x0, 0x6, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0x43b, 0x5}, 0x80, 0x9, 0x8, 0x0, 0x0, 0x101, 0x800, 0x0, 0x40, 0x0, 0x54f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) (async) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x1}, 0x7) socketpair(0x1a, 0x80000, 0xfffffff7, &(0x7f0000000200)) (async) socketpair(0x1a, 0x80000, 0xfffffff7, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="560000007d0100000040000010000020020000000500015ff0aef900000000000000000008000000000500000007000000000000000200242d07002e7b2e402d299b000004003a27", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32], 0x56) (async) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="560000007d0100000040000010000020020000000500015ff0aef900000000000000000008000000000500000007000000000000000200242d07002e7b2e402d299b000004003a27", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32], 0x56) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RVERSION(r3, &(0x7f00000001c0)={0x13, 0x65, 0xffff, 0x4, 0x6, '9P2000'}, 0x13) D0307 12:03:05.240846 678849 task_exit.go:204] [ 21568: 21568] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.241060 678849 task_signals.go:204] [ 21568: 21573] Signal 21568, PID: 21573, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.241118 678849 task_exit.go:204] [ 21568: 21568] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.241460 678849 task_exit.go:204] [ 21568: 21573] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.243045 678849 task_exit.go:204] [ 21568: 21573] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.243095 678849 task_exit.go:204] [ 21568: 21573] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.243167 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:05.254675 678849 task_exit.go:204] [ 21568: 21568] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.281505 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.281825 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.283562 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.283889 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 2: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.375496 678849 usertrap_amd64.go:212] [ 21570: 21570] Found the pattern at ip 55b880b7fe1a:sysno 230 D0307 12:03:05.375579 678849 usertrap_amd64.go:122] [ 21570: 21570] Allocate a new trap: 0xc003d708d0 40 D0307 12:03:05.375698 678849 usertrap_amd64.go:225] [ 21570: 21570] Apply the binary patch addr 55b880b7fe1a trap addr 6ac80 ([184 230 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.380011 678849 usertrap_amd64.go:212] [ 21577: 21577] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.380114 678849 usertrap_amd64.go:122] [ 21577: 21577] Allocate a new trap: 0xc001430600 38 D0307 12:03:05.380471 678849 usertrap_amd64.go:225] [ 21577: 21577] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.382526 678849 usertrap_amd64.go:212] [ 21577: 21577] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.382599 678849 usertrap_amd64.go:122] [ 21577: 21577] Allocate a new trap: 0xc001430600 39 D0307 12:03:05.382663 678849 usertrap_amd64.go:225] [ 21577: 21577] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.383841 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.384216 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.387393 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.387750 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.388005 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.388314 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.388515 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.388898 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.394932 678849 usertrap_amd64.go:212] [ 21570: 21570] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.395001 678849 usertrap_amd64.go:122] [ 21570: 21570] Allocate a new trap: 0xc003d708d0 41 D0307 12:03:05.395073 678849 usertrap_amd64.go:225] [ 21570: 21570] Apply the binary patch addr 55b880b0cfa4 trap addr 6acd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 12:03:05.403411 678849 task_exit.go:204] [ 21570: 21570] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.403704 678849 task_signals.go:204] [ 21570: 21575] Signal 21570, PID: 21575, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.403818 678849 task_exit.go:204] [ 21570: 21575] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.403723 678849 task_signals.go:204] [ 21570: 21578] Signal 21570, PID: 21578, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.404005 678849 task_exit.go:204] [ 21570: 21578] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.404476 678849 task_exit.go:204] [ 21570: 21570] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.404659 678849 task_exit.go:204] [ 21570: 21578] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.404788 678849 task_exit.go:204] [ 21570: 21578] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.406197 678849 task_exit.go:204] [ 21570: 21575] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.406258 678849 task_exit.go:204] [ 21570: 21575] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.406371 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.407186 678849 task_exit.go:204] [ 21570: 21570] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:05.415244 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.415330 678849 usertrap_amd64.go:212] [ 21569: 21569] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:05.415391 678849 usertrap_amd64.go:122] [ 21569: 21569] Allocate a new trap: 0xc001430570 40 D0307 12:03:05.415482 678849 usertrap_amd64.go:225] [ 21569: 21569] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:05.415615 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.418651 678849 task_exit.go:204] [ 21569: 21569] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.419203 678849 task_signals.go:204] [ 21569: 21579] Signal 21569, PID: 21579, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.419345 678849 task_exit.go:204] [ 21569: 21579] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.419521 678849 task_signals.go:204] [ 21569: 21581] Signal 21569, PID: 21581, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.419621 678849 task_signals.go:204] [ 21569: 21574] Signal 21569, PID: 21574, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.419778 678849 task_exit.go:204] [ 21569: 21581] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.419977 678849 task_signals.go:204] [ 21569: 21576] Signal 21569, PID: 21576, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.420146 678849 task_exit.go:204] [ 21569: 21581] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.420248 678849 task_exit.go:204] [ 21569: 21581] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.421397 678849 task_exit.go:204] [ 21569: 21579] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.421499 678849 task_exit.go:204] [ 21569: 21579] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.421523 678849 usertrap_amd64.go:212] [ 21580: 21580] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.421617 678849 usertrap_amd64.go:122] [ 21580: 21580] Allocate a new trap: 0xc008f96f90 38 D0307 12:03:05.421675 678849 task_exit.go:204] [ 21569: 21569] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.421776 678849 task_exit.go:204] [ 21569: 21574] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.422003 678849 task_exit.go:204] [ 21569: 21574] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.422043 678849 task_exit.go:204] [ 21569: 21574] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.422133 678849 task_exit.go:204] [ 21569: 21576] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.422567 678849 usertrap_amd64.go:225] [ 21580: 21580] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) 12:03:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.424542 678849 task_exit.go:204] [ 21569: 21576] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.424604 678849 task_exit.go:204] [ 21569: 21576] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.424691 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:05.425075 678849 usertrap_amd64.go:212] [ 21580: 21580] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.425131 678849 usertrap_amd64.go:122] [ 21580: 21580] Allocate a new trap: 0xc008f96f90 39 D0307 12:03:05.425212 678849 usertrap_amd64.go:225] [ 21580: 21580] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.425621 678849 task_exit.go:204] [ 21569: 21569] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.427569 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.429961 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.432302 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.432560 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.455907 678849 usertrap_amd64.go:212] [ 21583: 21583] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.456058 678849 usertrap_amd64.go:122] [ 21583: 21583] Allocate a new trap: 0xc008f96ff0 38 D0307 12:03:05.456555 678849 usertrap_amd64.go:225] [ 21583: 21583] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:05.458208 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.458588 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.466441 678849 usertrap_amd64.go:212] [ 21577: 21577] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.466513 678849 usertrap_amd64.go:122] [ 21577: 21577] Allocate a new trap: 0xc001430600 40 D0307 12:03:05.466587 678849 usertrap_amd64.go:225] [ 21577: 21577] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.476468 678849 usertrap_amd64.go:212] [ 21583: 21583] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.476548 678849 usertrap_amd64.go:122] [ 21583: 21583] Allocate a new trap: 0xc008f96ff0 39 D0307 12:03:05.476695 678849 usertrap_amd64.go:225] [ 21583: 21583] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.478921 678849 task_exit.go:204] [ 21577: 21577] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.479192 678849 task_exit.go:204] [ 21577: 21577] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.479190 678849 task_signals.go:204] [ 21577: 21582] Signal 21577, PID: 21582, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.479314 678849 task_exit.go:204] [ 21577: 21582] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.481235 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.481510 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.482038 678849 task_exit.go:204] [ 21577: 21582] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.482131 678849 task_exit.go:204] [ 21577: 21582] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.482359 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:05.487096 678849 task_exit.go:204] [ 21577: 21577] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 2: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x12000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_bp, 0x190, 0x3868000, 0x0, 0x8, 0x8000, 0x8b28, 0x101, 0x0, 0x36a, 0x0, 0x8}, 0x0, 0x6, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.490571 678849 usertrap_amd64.go:212] [ 21580: 21580] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.490645 678849 usertrap_amd64.go:122] [ 21580: 21580] Allocate a new trap: 0xc008f96f90 40 D0307 12:03:05.490740 678849 usertrap_amd64.go:225] [ 21580: 21580] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.493299 678849 task_exit.go:204] [ 21580: 21580] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.493508 678849 task_exit.go:204] [ 21580: 21580] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.493670 678849 task_signals.go:204] [ 21580: 21584] Signal 21580, PID: 21584, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.493929 678849 task_exit.go:204] [ 21580: 21584] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.494094 678849 task_signals.go:204] [ 21580: 21586] Signal 21580, PID: 21586, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.494205 678849 task_exit.go:204] [ 21580: 21586] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.494406 678849 task_exit.go:204] [ 21580: 21584] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.494453 678849 task_exit.go:204] [ 21580: 21584] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.495324 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.496767 678849 task_exit.go:204] [ 21580: 21586] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.496814 678849 task_exit.go:204] [ 21580: 21586] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.496803 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.496887 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.500540 678849 task_exit.go:204] [ 21580: 21580] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.506987 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.507424 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:05.516992 678849 usertrap_amd64.go:212] [ 21585: 21585] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.517117 678849 usertrap_amd64.go:122] [ 21585: 21585] Allocate a new trap: 0xc0076b3710 38 D0307 12:03:05.517523 678849 usertrap_amd64.go:225] [ 21585: 21585] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.519882 678849 usertrap_amd64.go:212] [ 21585: 21585] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.519959 678849 usertrap_amd64.go:122] [ 21585: 21585] Allocate a new trap: 0xc0076b3710 39 D0307 12:03:05.520070 678849 usertrap_amd64.go:225] [ 21585: 21585] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.521463 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.521801 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.522668 678849 usertrap_amd64.go:212] [ 21583: 21583] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.522772 678849 usertrap_amd64.go:122] [ 21583: 21583] Allocate a new trap: 0xc008f96ff0 40 D0307 12:03:05.522776 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.522877 678849 usertrap_amd64.go:225] [ 21583: 21583] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.523134 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.526908 678849 task_exit.go:204] [ 21583: 21583] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.527144 678849 task_exit.go:204] [ 21583: 21583] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.527278 678849 task_signals.go:204] [ 21583: 21588] Signal 21583, PID: 21588, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.527370 678849 task_exit.go:204] [ 21583: 21588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.529386 678849 usertrap_amd64.go:212] [ 21587: 21587] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.529502 678849 usertrap_amd64.go:122] [ 21587: 21587] Allocate a new trap: 0xc001430720 38 D0307 12:03:05.529982 678849 task_exit.go:204] [ 21583: 21588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.530086 678849 task_exit.go:204] [ 21583: 21588] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.530095 678849 usertrap_amd64.go:225] [ 21587: 21587] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.530202 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.532015 678849 task_exit.go:204] [ 21583: 21583] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.532325 678849 usertrap_amd64.go:212] [ 21587: 21587] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.532388 678849 usertrap_amd64.go:122] [ 21587: 21587] Allocate a new trap: 0xc001430720 39 D0307 12:03:05.532467 678849 usertrap_amd64.go:225] [ 21587: 21587] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.538180 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.538496 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:05.544621 678849 usertrap_amd64.go:212] [ 21589: 21589] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.544787 678849 usertrap_amd64.go:122] [ 21589: 21589] Allocate a new trap: 0xc007c7aa50 38 D0307 12:03:05.545202 678849 usertrap_amd64.go:225] [ 21589: 21589] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.546202 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.547232 678849 usertrap_amd64.go:212] [ 21589: 21589] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.547374 678849 usertrap_amd64.go:122] [ 21589: 21589] Allocate a new trap: 0xc007c7aa50 39 D0307 12:03:05.547684 678849 usertrap_amd64.go:225] [ 21589: 21589] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.547758 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.555671 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.556040 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.561547 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.562281 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.570413 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.570901 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.591869 678849 usertrap_amd64.go:212] [ 21585: 21585] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:05.591973 678849 usertrap_amd64.go:122] [ 21585: 21585] Allocate a new trap: 0xc0076b3710 40 D0307 12:03:05.592112 678849 usertrap_amd64.go:225] [ 21585: 21585] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:05.604093 678849 usertrap_amd64.go:212] [ 21589: 21589] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.604213 678849 usertrap_amd64.go:122] [ 21589: 21589] Allocate a new trap: 0xc007c7aa50 40 D0307 12:03:05.604292 678849 usertrap_amd64.go:225] [ 21589: 21589] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.605107 678849 task_exit.go:204] [ 21585: 21585] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.605299 678849 task_exit.go:204] [ 21585: 21585] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.605348 678849 usertrap_amd64.go:212] [ 21592: 21592] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.605521 678849 usertrap_amd64.go:122] [ 21592: 21592] Allocate a new trap: 0xc0098e12c0 38 D0307 12:03:05.607429 678849 task_signals.go:204] [ 21585: 21590] Signal 21585, PID: 21590, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.607515 678849 task_exit.go:204] [ 21585: 21590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.607655 678849 task_exit.go:204] [ 21585: 21590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.607723 678849 task_exit.go:204] [ 21585: 21590] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.609668 678849 usertrap_amd64.go:225] [ 21592: 21592] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:05.609879 678849 task_signals.go:204] [ 21585: 21593] Signal 21585, PID: 21593, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.610013 678849 task_exit.go:204] [ 21585: 21593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.610142 678849 task_signals.go:204] [ 21585: 21591] Signal 21585, PID: 21591, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.610227 678849 task_exit.go:204] [ 21585: 21593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.610287 678849 task_exit.go:204] [ 21585: 21593] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.610680 678849 task_exit.go:204] [ 21585: 21591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.614316 678849 task_exit.go:204] [ 21585: 21591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.614629 678849 task_exit.go:204] [ 21585: 21591] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.614841 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:05.615396 678849 task_exit.go:204] [ 21585: 21585] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.616089 678849 task_exit.go:204] [ 21589: 21589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.616249 678849 task_signals.go:204] [ 21589: 21594] Signal 21589, PID: 21594, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.616354 678849 task_exit.go:204] [ 21589: 21594] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.618493 678849 task_exit.go:204] [ 21589: 21594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.618585 678849 task_exit.go:204] [ 21589: 21594] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.618816 678849 task_exit.go:204] [ 21589: 21589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.618958 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.619459 678849 task_exit.go:204] [ 21589: 21589] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:05.628391 678849 usertrap_amd64.go:212] [ 21592: 21592] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.628521 678849 usertrap_amd64.go:122] [ 21592: 21592] Allocate a new trap: 0xc0098e12c0 39 D0307 12:03:05.628616 678849 usertrap_amd64.go:225] [ 21592: 21592] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.630395 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.630773 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.633666 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.634162 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.638334 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.638746 678849 usertrap_amd64.go:212] [ 21587: 21587] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.638826 678849 usertrap_amd64.go:122] [ 21587: 21587] Allocate a new trap: 0xc001430720 40 D0307 12:03:05.638843 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.638922 678849 usertrap_amd64.go:225] [ 21587: 21587] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.651695 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.652554 678849 task_exit.go:204] [ 21587: 21587] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.652798 678849 task_exit.go:204] [ 21587: 21587] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.656935 678849 task_signals.go:204] [ 21587: 21595] Signal 21587, PID: 21595, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.657082 678849 task_exit.go:204] [ 21587: 21595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.657071 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.659537 678849 task_exit.go:204] [ 21587: 21595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.659745 678849 task_exit.go:204] [ 21587: 21595] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.659868 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:05.663488 678849 task_exit.go:204] [ 21587: 21587] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x6, 0x68, 0x0, 0x5, 0x1060, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8, 0xe7, 0x4, 0x5, 0x8, 0x40, 0x2, 0x0, 0x6083cb5e, 0x0, 0xffffffffffffff43}, 0x0, 0xf, r0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.685881 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.687133 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.696838 678849 usertrap_amd64.go:212] [ 21596: 21596] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.697102 678849 usertrap_amd64.go:122] [ 21596: 21596] Allocate a new trap: 0xc007c7aa80 38 D0307 12:03:05.697550 678849 usertrap_amd64.go:225] [ 21596: 21596] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.699068 678849 usertrap_amd64.go:212] [ 21597: 21597] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.699173 678849 usertrap_amd64.go:122] [ 21597: 21597] Allocate a new trap: 0xc001430750 38 D0307 12:03:05.699542 678849 usertrap_amd64.go:225] [ 21597: 21597] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.701692 678849 usertrap_amd64.go:212] [ 21596: 21596] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.701718 678849 usertrap_amd64.go:212] [ 21597: 21597] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.701769 678849 usertrap_amd64.go:122] [ 21596: 21596] Allocate a new trap: 0xc007c7aa80 39 D0307 12:03:05.701786 678849 usertrap_amd64.go:122] [ 21597: 21597] Allocate a new trap: 0xc001430750 39 D0307 12:03:05.701825 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.701896 678849 usertrap_amd64.go:225] [ 21597: 21597] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.702156 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.701847 678849 usertrap_amd64.go:225] [ 21596: 21596] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.703131 678849 usertrap_amd64.go:212] [ 21592: 21592] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.703195 678849 usertrap_amd64.go:122] [ 21592: 21592] Allocate a new trap: 0xc0098e12c0 40 D0307 12:03:05.703260 678849 usertrap_amd64.go:225] [ 21592: 21592] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.705306 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.705600 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.706593 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.706898 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.706998 678849 task_exit.go:204] [ 21592: 21592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.707210 678849 task_signals.go:204] [ 21592: 21598] Signal 21592, PID: 21598, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.707845 678849 task_exit.go:204] [ 21592: 21592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.711459 678849 task_exit.go:204] [ 21592: 21598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.713941 678849 task_exit.go:204] [ 21592: 21598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.714017 678849 task_exit.go:204] [ 21592: 21598] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.714118 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.714623 678849 task_exit.go:204] [ 21592: 21592] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) D0307 12:03:05.726381 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.726766 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.747599 678849 usertrap_amd64.go:212] [ 21599: 21599] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.747704 678849 usertrap_amd64.go:122] [ 21599: 21599] Allocate a new trap: 0xc003d70fc0 38 D0307 12:03:05.747841 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.748182 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.748253 678849 usertrap_amd64.go:225] [ 21599: 21599] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.748976 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.749221 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.756477 678849 usertrap_amd64.go:212] [ 21597: 21597] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.756555 678849 usertrap_amd64.go:122] [ 21597: 21597] Allocate a new trap: 0xc001430750 40 D0307 12:03:05.756657 678849 usertrap_amd64.go:225] [ 21597: 21597] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.761933 678849 usertrap_amd64.go:212] [ 21600: 21600] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.762068 678849 usertrap_amd64.go:122] [ 21600: 21600] Allocate a new trap: 0xc0090043f0 38 D0307 12:03:05.762539 678849 usertrap_amd64.go:225] [ 21600: 21600] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:05.762821 678849 usertrap_amd64.go:212] [ 21599: 21599] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.763006 678849 usertrap_amd64.go:122] [ 21599: 21599] Allocate a new trap: 0xc003d70fc0 39 D0307 12:03:05.763215 678849 usertrap_amd64.go:225] [ 21599: 21599] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.764887 678849 task_exit.go:204] [ 21597: 21597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.765227 678849 task_exit.go:204] [ 21597: 21597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.765426 678849 task_signals.go:204] [ 21597: 21602] Signal 21597, PID: 21602, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.765577 678849 task_exit.go:204] [ 21597: 21602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.767597 678849 task_exit.go:204] [ 21597: 21602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.767677 678849 task_exit.go:204] [ 21597: 21602] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.767775 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.769035 678849 task_exit.go:204] [ 21597: 21597] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:05.771087 678849 usertrap_amd64.go:212] [ 21600: 21600] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.771417 678849 usertrap_amd64.go:122] [ 21600: 21600] Allocate a new trap: 0xc0090043f0 39 D0307 12:03:05.771635 678849 usertrap_amd64.go:225] [ 21600: 21600] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.774559 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.774961 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.775275 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.777176 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.781262 678849 usertrap_amd64.go:212] [ 21596: 21596] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:05.781370 678849 usertrap_amd64.go:122] [ 21596: 21596] Allocate a new trap: 0xc007c7aa80 40 D0307 12:03:05.781457 678849 usertrap_amd64.go:225] [ 21596: 21596] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:05.781607 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.781983 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.788289 678849 task_exit.go:204] [ 21596: 21596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.788532 678849 task_signals.go:204] [ 21596: 21601] Signal 21596, PID: 21601, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.788633 678849 task_signals.go:204] [ 21596: 21603] Signal 21596, PID: 21603, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.788699 678849 task_exit.go:204] [ 21596: 21601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.788858 678849 task_exit.go:204] [ 21596: 21603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.789224 678849 task_exit.go:204] [ 21596: 21603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.789324 678849 task_exit.go:204] [ 21596: 21603] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.789608 678849 task_exit.go:204] [ 21596: 21596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.791871 678849 task_exit.go:204] [ 21596: 21601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.791963 678849 task_exit.go:204] [ 21596: 21601] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.792034 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:05.792316 678849 task_exit.go:204] [ 21596: 21596] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.805757 678849 usertrap_amd64.go:212] [ 21604: 21604] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.805863 678849 usertrap_amd64.go:122] [ 21604: 21604] Allocate a new trap: 0xc0037f1b00 38 D0307 12:03:05.806422 678849 usertrap_amd64.go:225] [ 21604: 21604] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.811730 678849 usertrap_amd64.go:212] [ 21604: 21604] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.811805 678849 usertrap_amd64.go:122] [ 21604: 21604] Allocate a new trap: 0xc0037f1b00 39 D0307 12:03:05.811878 678849 usertrap_amd64.go:225] [ 21604: 21604] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.814092 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.815171 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.815328 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.815751 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.816459 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.816791 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.817826 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.817828 678849 usertrap_amd64.go:212] [ 21600: 21600] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.817998 678849 usertrap_amd64.go:122] [ 21600: 21600] Allocate a new trap: 0xc0090043f0 40 D0307 12:03:05.818015 678849 usertrap_amd64.go:212] [ 21599: 21599] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.818068 678849 usertrap_amd64.go:225] [ 21600: 21600] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.818093 678849 usertrap_amd64.go:122] [ 21599: 21599] Allocate a new trap: 0xc003d70fc0 40 D0307 12:03:05.818173 678849 usertrap_amd64.go:225] [ 21599: 21599] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.818252 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.821542 678849 task_exit.go:204] [ 21599: 21599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.821750 678849 task_signals.go:204] [ 21599: 21606] Signal 21599, PID: 21606, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.821820 678849 task_exit.go:204] [ 21599: 21599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.821977 678849 task_exit.go:204] [ 21599: 21606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.824820 678849 task_exit.go:204] [ 21599: 21606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.825038 678849 task_exit.go:204] [ 21599: 21606] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.825178 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:05.826507 678849 task_exit.go:204] [ 21599: 21599] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.830943 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.831265 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.834820 678849 task_exit.go:204] [ 21600: 21600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.835162 678849 task_exit.go:204] [ 21600: 21600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.836405 678849 task_signals.go:204] [ 21600: 21605] Signal 21600, PID: 21605, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.836545 678849 task_exit.go:204] [ 21600: 21605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.838817 678849 task_exit.go:204] [ 21600: 21605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.838927 678849 task_exit.go:204] [ 21600: 21605] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.839063 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.839798 678849 task_exit.go:204] [ 21600: 21600] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.850616 678849 usertrap_amd64.go:212] [ 21607: 21607] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.850741 678849 usertrap_amd64.go:122] [ 21607: 21607] Allocate a new trap: 0xc0014c6660 38 D0307 12:03:05.851145 678849 usertrap_amd64.go:225] [ 21607: 21607] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.854929 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.855219 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.855805 678849 usertrap_amd64.go:212] [ 21607: 21607] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.855858 678849 usertrap_amd64.go:122] [ 21607: 21607] Allocate a new trap: 0xc0014c6660 39 D0307 12:03:05.855912 678849 usertrap_amd64.go:225] [ 21607: 21607] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.865835 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.866125 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.868879 678849 usertrap_amd64.go:212] [ 21604: 21604] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.868995 678849 usertrap_amd64.go:122] [ 21604: 21604] Allocate a new trap: 0xc0037f1b00 40 D0307 12:03:05.869056 678849 usertrap_amd64.go:225] [ 21604: 21604] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.871776 678849 task_exit.go:204] [ 21604: 21604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.871888 678849 task_signals.go:204] [ 21604: 21609] Signal 21604, PID: 21609, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.871958 678849 task_exit.go:204] [ 21604: 21604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.872301 678849 task_exit.go:204] [ 21604: 21609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.874034 678849 task_exit.go:204] [ 21604: 21609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.874085 678849 task_exit.go:204] [ 21604: 21609] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.874145 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.875410 678849 task_exit.go:204] [ 21604: 21604] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.878769 678849 usertrap_amd64.go:212] [ 21610: 21610] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.878882 678849 usertrap_amd64.go:122] [ 21610: 21610] Allocate a new trap: 0xc0098e14d0 38 D0307 12:03:05.879341 678849 usertrap_amd64.go:225] [ 21610: 21610] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) 12:03:05 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x17) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x800000, 0x40010, r0, 0x9) D0307 12:03:05.881608 678849 usertrap_amd64.go:212] [ 21610: 21610] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:05.881661 678849 usertrap_amd64.go:122] [ 21610: 21610] Allocate a new trap: 0xc0098e14d0 39 D0307 12:03:05.881723 678849 usertrap_amd64.go:225] [ 21610: 21610] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:05.885061 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.888846 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.889064 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.891037 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.907176 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.907516 678849 usertrap_amd64.go:212] [ 21608: 21608] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:05.907642 678849 usertrap_amd64.go:122] [ 21608: 21608] Allocate a new trap: 0xc002dccc00 38 D0307 12:03:05.907962 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.908011 678849 usertrap_amd64.go:225] [ 21608: 21608] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:05.909798 678849 usertrap_amd64.go:212] [ 21607: 21607] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:05.909847 678849 usertrap_amd64.go:122] [ 21607: 21607] Allocate a new trap: 0xc0014c6660 40 D0307 12:03:05.909908 678849 usertrap_amd64.go:225] [ 21607: 21607] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:05.913155 678849 usertrap_amd64.go:212] [ 21608: 21608] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:05.913240 678849 usertrap_amd64.go:122] [ 21608: 21608] Allocate a new trap: 0xc002dccc00 39 D0307 12:03:05.913299 678849 usertrap_amd64.go:225] [ 21608: 21608] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:05.915198 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.915534 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.915856 678849 task_exit.go:204] [ 21607: 21607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.916050 678849 task_signals.go:204] [ 21607: 21611] Signal 21607, PID: 21611, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.916337 678849 task_exit.go:204] [ 21607: 21611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.916683 678849 task_exit.go:204] [ 21607: 21607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.919244 678849 task_exit.go:204] [ 21607: 21611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.919309 678849 task_exit.go:204] [ 21607: 21611] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.919387 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:05.919667 678849 task_exit.go:204] [ 21607: 21607] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.920578 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.920840 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) pipe(&(0x7f0000000000)) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:05.921858 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.922164 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.923936 678849 usertrap_amd64.go:212] [ 21612: 21612] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:05.923955 678849 usertrap_amd64.go:212] [ 21610: 21610] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:05.924087 678849 usertrap_amd64.go:122] [ 21612: 21612] Allocate a new trap: 0xc0037f1b30 38 D0307 12:03:05.924097 678849 usertrap_amd64.go:122] [ 21610: 21610] Allocate a new trap: 0xc0098e14d0 40 D0307 12:03:05.924365 678849 usertrap_amd64.go:225] [ 21610: 21610] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:05.926110 678849 usertrap_amd64.go:225] [ 21612: 21612] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:05.927065 678849 task_exit.go:204] [ 21610: 21610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.927304 678849 task_signals.go:204] [ 21610: 21613] Signal 21610, PID: 21613, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.927367 678849 task_exit.go:204] [ 21610: 21610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.927446 678849 task_exit.go:204] [ 21610: 21613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.928358 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.928615 678849 usertrap_amd64.go:212] [ 21612: 21612] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:05.928627 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.928671 678849 usertrap_amd64.go:122] [ 21612: 21612] Allocate a new trap: 0xc0037f1b30 39 D0307 12:03:05.928848 678849 usertrap_amd64.go:225] [ 21612: 21612] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:05.929276 678849 task_exit.go:204] [ 21610: 21613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.929336 678849 task_exit.go:204] [ 21610: 21613] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.929435 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:05.929620 678849 task_exit.go:204] [ 21610: 21610] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.931111 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.931337 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:05 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50, 0x0, 0x0, 0x0) D0307 12:03:05.946920 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.947379 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.959829 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.960212 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.961139 678849 usertrap_amd64.go:212] [ 21615: 21615] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:05.961263 678849 usertrap_amd64.go:122] [ 21615: 21615] Allocate a new trap: 0xc006677050 38 D0307 12:03:05.961634 678849 usertrap_amd64.go:225] [ 21615: 21615] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:05.962318 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.962530 678849 usertrap_amd64.go:212] [ 21608: 21608] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:05.962644 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.962698 678849 usertrap_amd64.go:122] [ 21608: 21608] Allocate a new trap: 0xc002dccc00 40 D0307 12:03:05.962783 678849 usertrap_amd64.go:225] [ 21608: 21608] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:05.963783 678849 usertrap_amd64.go:212] [ 21612: 21612] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:05.963856 678849 usertrap_amd64.go:122] [ 21612: 21612] Allocate a new trap: 0xc0037f1b30 40 D0307 12:03:05.964046 678849 usertrap_amd64.go:225] [ 21612: 21612] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:05.964334 678849 usertrap_amd64.go:212] [ 21615: 21615] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:05.964408 678849 usertrap_amd64.go:122] [ 21615: 21615] Allocate a new trap: 0xc006677050 39 D0307 12:03:05.964512 678849 usertrap_amd64.go:225] [ 21615: 21615] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:05.974842 678849 task_exit.go:204] [ 21612: 21612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.975160 678849 task_exit.go:204] [ 21612: 21612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.975133 678849 task_signals.go:204] [ 21612: 21616] Signal 21612, PID: 21616, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.975308 678849 task_exit.go:204] [ 21612: 21616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.977913 678849 task_exit.go:204] [ 21612: 21616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.978011 678849 task_exit.go:204] [ 21612: 21616] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.978114 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:05.978663 678849 task_exit.go:204] [ 21612: 21612] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.980817 678849 task_exit.go:204] [ 21608: 21608] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:05 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x17) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x800000, 0x40010, r0, 0x9) D0307 12:03:05.981139 678849 task_exit.go:204] [ 21608: 21608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.982774 678849 task_signals.go:204] [ 21608: 21614] Signal 21608, PID: 21614, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:05.983100 678849 task_exit.go:204] [ 21608: 21614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:05.984678 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:05.985094 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.985172 678849 task_exit.go:204] [ 21608: 21614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:05.985226 678849 task_exit.go:204] [ 21608: 21614] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.985318 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:05.985805 678849 task_exit.go:204] [ 21608: 21608] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:05.988421 678849 usertrap_amd64.go:212] [ 21617: 21617] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:05.988499 678849 usertrap_amd64.go:122] [ 21617: 21617] Allocate a new trap: 0xc0037f1b60 38 D0307 12:03:05.988762 678849 usertrap_amd64.go:225] [ 21617: 21617] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) 12:03:05 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:05.994152 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.994542 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:05.997729 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:05.998122 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.001549 678849 usertrap_amd64.go:212] [ 21617: 21617] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.001623 678849 usertrap_amd64.go:122] [ 21617: 21617] Allocate a new trap: 0xc0037f1b60 39 D0307 12:03:06.001976 678849 usertrap_amd64.go:225] [ 21617: 21617] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.006272 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.006582 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.032434 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.033015 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.035257 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.035598 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.038391 678849 usertrap_amd64.go:212] [ 21617: 21617] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.038493 678849 usertrap_amd64.go:122] [ 21617: 21617] Allocate a new trap: 0xc0037f1b60 40 D0307 12:03:06.038643 678849 usertrap_amd64.go:225] [ 21617: 21617] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.046002 678849 task_exit.go:204] [ 21617: 21617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.046230 678849 task_exit.go:204] [ 21617: 21617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.047503 678849 task_signals.go:204] [ 21617: 21621] Signal 21617, PID: 21621, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.047639 678849 task_exit.go:204] [ 21617: 21621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.048620 678849 usertrap_amd64.go:212] [ 21620: 21620] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.048824 678849 usertrap_amd64.go:122] [ 21620: 21620] Allocate a new trap: 0xc001430a20 38 D0307 12:03:06.050549 678849 task_exit.go:204] [ 21617: 21621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.050641 678849 task_exit.go:204] [ 21617: 21621] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.050785 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.051465 678849 task_exit.go:204] [ 21617: 21617] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.051785 678849 usertrap_amd64.go:212] [ 21615: 21615] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.051871 678849 usertrap_amd64.go:122] [ 21615: 21615] Allocate a new trap: 0xc006677050 40 D0307 12:03:06.051959 678849 usertrap_amd64.go:225] [ 21615: 21615] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) 12:03:06 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x3000008) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) D0307 12:03:06.055073 678849 usertrap_amd64.go:225] [ 21620: 21620] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.055785 678849 task_exit.go:204] [ 21615: 21615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.055875 678849 usertrap_amd64.go:212] [ 21618: 21618] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.056016 678849 usertrap_amd64.go:122] [ 21618: 21618] Allocate a new trap: 0xc008046a20 38 D0307 12:03:06.056124 678849 task_exit.go:204] [ 21615: 21615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.056132 678849 task_signals.go:204] [ 21615: 21622] Signal 21615, PID: 21622, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.056000 678849 task_signals.go:204] [ 21615: 21619] Signal 21615, PID: 21619, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.056276 678849 task_exit.go:204] [ 21615: 21622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.056441 678849 usertrap_amd64.go:225] [ 21618: 21618] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.056770 678849 task_exit.go:204] [ 21615: 21619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.057261 678849 task_exit.go:204] [ 21615: 21622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.057345 678849 task_exit.go:204] [ 21615: 21622] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.059518 678849 task_exit.go:204] [ 21615: 21619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.059600 678849 task_exit.go:204] [ 21615: 21619] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.059686 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.060208 678849 task_exit.go:204] [ 21615: 21615] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.060527 678849 usertrap_amd64.go:212] [ 21618: 21618] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.060607 678849 usertrap_amd64.go:122] [ 21618: 21618] Allocate a new trap: 0xc008046a20 39 D0307 12:03:06.060687 678849 usertrap_amd64.go:225] [ 21618: 21618] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) pipe(&(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:06.063766 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.064120 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.065368 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.065730 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.066561 678849 usertrap_amd64.go:212] [ 21620: 21620] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.066645 678849 usertrap_amd64.go:122] [ 21620: 21620] Allocate a new trap: 0xc001430a20 39 D0307 12:03:06.066719 678849 usertrap_amd64.go:225] [ 21620: 21620] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.068561 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.068929 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.071437 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.071905 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.099219 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.099653 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.102236 678849 usertrap_amd64.go:212] [ 21618: 21618] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.102342 678849 usertrap_amd64.go:122] [ 21618: 21618] Allocate a new trap: 0xc008046a20 40 D0307 12:03:06.102421 678849 usertrap_amd64.go:225] [ 21618: 21618] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.105031 678849 task_exit.go:204] [ 21618: 21618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.105248 678849 task_signals.go:204] [ 21618: 21626] Signal 21618, PID: 21626, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.105240 678849 task_signals.go:204] [ 21618: 21624] Signal 21618, PID: 21624, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.105316 678849 task_exit.go:204] [ 21618: 21626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.105437 678849 task_exit.go:204] [ 21618: 21624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.106422 678849 task_exit.go:204] [ 21618: 21624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.106512 678849 task_exit.go:204] [ 21618: 21624] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.106622 678849 task_exit.go:204] [ 21618: 21618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.108065 678849 task_exit.go:204] [ 21618: 21626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.108179 678849 task_exit.go:204] [ 21618: 21626] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.108293 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.110869 678849 task_exit.go:204] [ 21618: 21618] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.120886 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x17) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x800000, 0x40010, r0, 0x9) D0307 12:03:06.122306 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.124200 678849 usertrap_amd64.go:212] [ 21625: 21625] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.124419 678849 usertrap_amd64.go:122] [ 21625: 21625] Allocate a new trap: 0xc007c7aed0 38 D0307 12:03:06.124861 678849 usertrap_amd64.go:225] [ 21625: 21625] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.126884 678849 usertrap_amd64.go:212] [ 21625: 21625] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.127006 678849 usertrap_amd64.go:122] [ 21625: 21625] Allocate a new trap: 0xc007c7aed0 39 D0307 12:03:06.127133 678849 usertrap_amd64.go:225] [ 21625: 21625] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.130821 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.133080 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.134881 678849 usertrap_amd64.go:212] [ 21623: 21623] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.135040 678849 usertrap_amd64.go:122] [ 21623: 21623] Allocate a new trap: 0xc003d71350 38 D0307 12:03:06.135449 678849 usertrap_amd64.go:225] [ 21623: 21623] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.145380 678849 usertrap_amd64.go:212] [ 21623: 21623] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.145538 678849 usertrap_amd64.go:122] [ 21623: 21623] Allocate a new trap: 0xc003d71350 39 D0307 12:03:06.145638 678849 usertrap_amd64.go:225] [ 21623: 21623] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.145881 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.146232 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.147350 678849 usertrap_amd64.go:212] [ 21620: 21620] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.147435 678849 usertrap_amd64.go:122] [ 21620: 21620] Allocate a new trap: 0xc001430a20 40 D0307 12:03:06.147522 678849 usertrap_amd64.go:225] [ 21620: 21620] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.149658 678849 task_exit.go:204] [ 21620: 21620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.149919 678849 task_exit.go:204] [ 21620: 21620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.149921 678849 task_signals.go:204] [ 21620: 21627] Signal 21620, PID: 21627, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.150017 678849 task_exit.go:204] [ 21620: 21627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.151768 678849 task_exit.go:204] [ 21620: 21627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.151879 678849 task_exit.go:204] [ 21620: 21627] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.152034 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.152160 678849 task_exit.go:204] [ 21620: 21620] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:06.169844 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.170285 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.174058 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.174501 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.180386 678849 usertrap_amd64.go:212] [ 21628: 21628] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.180492 678849 usertrap_amd64.go:122] [ 21628: 21628] Allocate a new trap: 0xc0014c6c30 38 D0307 12:03:06.181251 678849 usertrap_amd64.go:225] [ 21628: 21628] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.184657 678849 usertrap_amd64.go:212] [ 21628: 21628] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.184717 678849 usertrap_amd64.go:122] [ 21628: 21628] Allocate a new trap: 0xc0014c6c30 39 D0307 12:03:06.184772 678849 usertrap_amd64.go:225] [ 21628: 21628] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.187213 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.187616 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.203648 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.204087 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.218262 678849 usertrap_amd64.go:212] [ 21625: 21625] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.218356 678849 usertrap_amd64.go:122] [ 21625: 21625] Allocate a new trap: 0xc007c7aed0 40 D0307 12:03:06.218432 678849 usertrap_amd64.go:225] [ 21625: 21625] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:06.230231 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.230597 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.232796 678849 usertrap_amd64.go:212] [ 21628: 21628] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.232879 678849 usertrap_amd64.go:122] [ 21628: 21628] Allocate a new trap: 0xc0014c6c30 40 D0307 12:03:06.232989 678849 usertrap_amd64.go:225] [ 21628: 21628] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.241223 678849 task_exit.go:204] [ 21625: 21625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.241466 678849 task_exit.go:204] [ 21625: 21625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.241792 678849 task_signals.go:204] [ 21625: 21629] Signal 21625, PID: 21629, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.241918 678849 task_exit.go:204] [ 21625: 21629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.242197 678849 task_exit.go:204] [ 21625: 21629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.242307 678849 task_exit.go:204] [ 21625: 21629] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.242563 678849 task_signals.go:204] [ 21625: 21631] Signal 21625, PID: 21631, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.242678 678849 task_exit.go:204] [ 21625: 21631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.244847 678849 task_exit.go:204] [ 21628: 21628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.245251 678849 task_exit.go:204] [ 21625: 21631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.245313 678849 task_exit.go:204] [ 21625: 21631] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.245392 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.245568 678849 task_signals.go:204] [ 21628: 21632] Signal 21628, PID: 21632, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.245716 678849 task_signals.go:204] [ 21628: 21633] Signal 21628, PID: 21633, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.246136 678849 task_exit.go:204] [ 21628: 21628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.246213 678849 task_exit.go:204] [ 21628: 21633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.246456 678849 task_exit.go:204] [ 21628: 21633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.246550 678849 task_exit.go:204] [ 21628: 21633] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.246667 678849 task_exit.go:204] [ 21628: 21632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.247257 678849 task_exit.go:204] [ 21625: 21625] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.249255 678849 task_exit.go:204] [ 21628: 21632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.249336 678849 task_exit.go:204] [ 21628: 21632] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.249419 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.249964 678849 task_exit.go:204] [ 21628: 21628] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x7ff}, 0xb) 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) D0307 12:03:06.256086 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.256799 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.266675 678849 usertrap_amd64.go:212] [ 21634: 21634] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.266776 678849 usertrap_amd64.go:122] [ 21634: 21634] Allocate a new trap: 0xc001430ae0 38 D0307 12:03:06.267267 678849 usertrap_amd64.go:225] [ 21634: 21634] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.272060 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.272370 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.274835 678849 usertrap_amd64.go:212] [ 21623: 21623] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.274962 678849 usertrap_amd64.go:122] [ 21623: 21623] Allocate a new trap: 0xc003d71350 40 D0307 12:03:06.275025 678849 usertrap_amd64.go:225] [ 21623: 21623] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.278523 678849 task_exit.go:204] [ 21623: 21623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.279019 678849 task_signals.go:204] [ 21623: 21635] Signal 21623, PID: 21635, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.279061 678849 task_signals.go:204] [ 21623: 21630] Signal 21623, PID: 21630, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.279182 678849 task_exit.go:204] [ 21623: 21635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.279412 678849 task_exit.go:204] [ 21623: 21630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.280140 678849 task_exit.go:204] [ 21623: 21623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.281443 678849 task_exit.go:204] [ 21623: 21630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.281654 678849 task_exit.go:204] [ 21623: 21630] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 1: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:06.282037 678849 task_exit.go:204] [ 21623: 21635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.282106 678849 task_exit.go:204] [ 21623: 21635] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.282201 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.283167 678849 task_exit.go:204] [ 21623: 21623] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.284043 678849 usertrap_amd64.go:212] [ 21634: 21634] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.284154 678849 usertrap_amd64.go:122] [ 21634: 21634] Allocate a new trap: 0xc001430ae0 39 D0307 12:03:06.284292 678849 usertrap_amd64.go:225] [ 21634: 21634] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.293150 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.294373 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.295059 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.296690 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.306701 678849 usertrap_amd64.go:212] [ 21636: 21636] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.306816 678849 usertrap_amd64.go:122] [ 21636: 21636] Allocate a new trap: 0xc009004a50 38 D0307 12:03:06.309984 678849 usertrap_amd64.go:225] [ 21636: 21636] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.319691 678849 usertrap_amd64.go:212] [ 21636: 21636] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.319823 678849 usertrap_amd64.go:122] [ 21636: 21636] Allocate a new trap: 0xc009004a50 39 D0307 12:03:06.319930 678849 usertrap_amd64.go:225] [ 21636: 21636] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.326123 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.326994 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.330506 678849 usertrap_amd64.go:212] [ 21637: 21637] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.330672 678849 usertrap_amd64.go:122] [ 21637: 21637] Allocate a new trap: 0xc001430b70 38 D0307 12:03:06.331219 678849 usertrap_amd64.go:212] [ 21634: 21634] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.331279 678849 usertrap_amd64.go:122] [ 21634: 21634] Allocate a new trap: 0xc001430ae0 40 D0307 12:03:06.331339 678849 usertrap_amd64.go:225] [ 21634: 21634] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.331373 678849 usertrap_amd64.go:225] [ 21637: 21637] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.335288 678849 task_exit.go:204] [ 21634: 21634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.335461 678849 usertrap_amd64.go:212] [ 21638: 21638] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.335654 678849 usertrap_amd64.go:122] [ 21638: 21638] Allocate a new trap: 0xc001430ba0 38 D0307 12:03:06.335698 678849 task_exit.go:204] [ 21634: 21634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.335754 678849 usertrap_amd64.go:212] [ 21637: 21637] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.335838 678849 usertrap_amd64.go:122] [ 21637: 21637] Allocate a new trap: 0xc001430b70 39 D0307 12:03:06.335939 678849 task_signals.go:204] [ 21634: 21639] Signal 21634, PID: 21639, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.335942 678849 usertrap_amd64.go:225] [ 21637: 21637] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.336038 678849 task_exit.go:204] [ 21634: 21639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.336305 678849 usertrap_amd64.go:225] [ 21638: 21638] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.338596 678849 usertrap_amd64.go:212] [ 21638: 21638] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.338645 678849 usertrap_amd64.go:122] [ 21638: 21638] Allocate a new trap: 0xc001430ba0 39 D0307 12:03:06.338725 678849 usertrap_amd64.go:225] [ 21638: 21638] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.338965 678849 task_exit.go:204] [ 21634: 21639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.339033 678849 task_exit.go:204] [ 21634: 21639] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.339158 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.342377 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.342898 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.346956 678849 task_exit.go:204] [ 21634: 21634] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.346937 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.348134 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:06 executing program 2: timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:06.354232 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.357980 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.382750 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.383559 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.385728 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.386058 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.387667 678849 usertrap_amd64.go:212] [ 21636: 21636] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.387735 678849 usertrap_amd64.go:122] [ 21636: 21636] Allocate a new trap: 0xc009004a50 40 D0307 12:03:06.387811 678849 usertrap_amd64.go:225] [ 21636: 21636] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:06.396790 678849 task_exit.go:204] [ 21636: 21636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.397098 678849 task_exit.go:204] [ 21636: 21636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.397363 678849 task_signals.go:204] [ 21636: 21640] Signal 21636, PID: 21640, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.397537 678849 task_exit.go:204] [ 21636: 21640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.399866 678849 task_exit.go:204] [ 21636: 21640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.400181 678849 task_exit.go:204] [ 21636: 21640] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.400491 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.401023 678849 task_exit.go:204] [ 21636: 21636] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x7ff}, 0xb) D0307 12:03:06.404937 678849 usertrap_amd64.go:212] [ 21638: 21638] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.405062 678849 usertrap_amd64.go:122] [ 21638: 21638] Allocate a new trap: 0xc001430ba0 40 D0307 12:03:06.405150 678849 usertrap_amd64.go:225] [ 21638: 21638] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.415624 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.416827 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.422587 678849 task_exit.go:204] [ 21638: 21638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.422869 678849 task_exit.go:204] [ 21638: 21638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.423046 678849 task_signals.go:204] [ 21638: 21641] Signal 21638, PID: 21641, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.423171 678849 task_exit.go:204] [ 21638: 21641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.423383 678849 usertrap_amd64.go:212] [ 21637: 21637] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.423474 678849 usertrap_amd64.go:122] [ 21637: 21637] Allocate a new trap: 0xc001430b70 40 D0307 12:03:06.423552 678849 usertrap_amd64.go:225] [ 21637: 21637] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.425613 678849 task_exit.go:204] [ 21638: 21641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.425678 678849 task_exit.go:204] [ 21638: 21641] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.425795 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.425909 678849 task_exit.go:204] [ 21638: 21638] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.426885 678849 task_exit.go:204] [ 21637: 21637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.427176 678849 task_exit.go:204] [ 21637: 21637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.427166 678849 task_signals.go:204] [ 21637: 21642] Signal 21637, PID: 21642, TID: 0, fault addr: 0x9: terminating thread group 12:03:06 executing program 1: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:06.427342 678849 task_exit.go:204] [ 21637: 21642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.429895 678849 task_exit.go:204] [ 21637: 21642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.430011 678849 task_exit.go:204] [ 21637: 21642] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.430185 678849 usertrap_amd64.go:212] [ 21643: 21643] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.430309 678849 usertrap_amd64.go:122] [ 21643: 21643] Allocate a new trap: 0xc008f973e0 38 D0307 12:03:06.430175 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.430794 678849 task_exit.go:204] [ 21637: 21637] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.430887 678849 usertrap_amd64.go:225] [ 21643: 21643] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.433894 678849 usertrap_amd64.go:212] [ 21643: 21643] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.433981 678849 usertrap_amd64.go:122] [ 21643: 21643] Allocate a new trap: 0xc008f973e0 39 D0307 12:03:06.434050 678849 usertrap_amd64.go:225] [ 21643: 21643] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.436599 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.436996 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.440904 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.441546 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.442564 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.442871 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) (async) D0307 12:03:06.446947 678849 task_signals.go:470] [ 8: 2163] Notified of signal 23 D0307 12:03:06.449007 678849 task_signals.go:179] [ 8: 2163] Restarting syscall 202: interrupted by signal 23 D0307 12:03:06.449139 678849 task_signals.go:220] [ 8: 2163] Signal 23: delivering to handler D0307 12:03:06.453848 678849 usertrap_amd64.go:212] [ 21643: 21643] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.453947 678849 usertrap_amd64.go:122] [ 21643: 21643] Allocate a new trap: 0xc008f973e0 40 D0307 12:03:06.454061 678849 usertrap_amd64.go:225] [ 21643: 21643] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.459770 678849 task_exit.go:204] [ 21643: 21643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.460012 678849 task_signals.go:204] [ 21643: 21645] Signal 21643, PID: 21645, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.460088 678849 task_exit.go:204] [ 21643: 21643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.460463 678849 task_exit.go:204] [ 21643: 21645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.462687 678849 task_exit.go:204] [ 21643: 21645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.462767 678849 task_exit.go:204] [ 21643: 21645] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.462861 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.464985 678849 task_exit.go:204] [ 21643: 21643] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:06.476064 678849 usertrap_amd64.go:212] [ 21644: 21644] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.476172 678849 usertrap_amd64.go:122] [ 21644: 21644] Allocate a new trap: 0xc006677290 38 D0307 12:03:06.477319 678849 usertrap_amd64.go:225] [ 21644: 21644] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.478237 678849 task_signals.go:470] [ 8: 6191] Notified of signal 23 D0307 12:03:06.479226 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.480000 678849 task_signals.go:220] [ 8: 6191] Signal 23: delivering to handler D0307 12:03:06.481214 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.481419 678849 task_signals.go:470] [ 8: 6191] Notified of signal 23 D0307 12:03:06.481411 678849 usertrap_amd64.go:212] [ 21646: 21646] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.481640 678849 usertrap_amd64.go:122] [ 21646: 21646] Allocate a new trap: 0xc0098d6360 38 D0307 12:03:06.481786 678849 task_signals.go:179] [ 8: 6191] Restarting syscall 202: interrupted by signal 23 D0307 12:03:06.481894 678849 task_signals.go:220] [ 8: 6191] Signal 23: delivering to handler D0307 12:03:06.481997 678849 usertrap_amd64.go:212] [ 21647: 21647] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.482104 678849 usertrap_amd64.go:122] [ 21647: 21647] Allocate a new trap: 0xc009d9a0f0 38 D0307 12:03:06.482157 678849 usertrap_amd64.go:225] [ 21646: 21646] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.482704 678849 usertrap_amd64.go:212] [ 21644: 21644] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.482775 678849 usertrap_amd64.go:122] [ 21644: 21644] Allocate a new trap: 0xc006677290 39 D0307 12:03:06.482782 678849 usertrap_amd64.go:225] [ 21647: 21647] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.482849 678849 usertrap_amd64.go:225] [ 21644: 21644] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.493238 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.493651 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.499542 678849 usertrap_amd64.go:212] [ 21646: 21646] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.499645 678849 usertrap_amd64.go:122] [ 21646: 21646] Allocate a new trap: 0xc0098d6360 39 D0307 12:03:06.499720 678849 usertrap_amd64.go:225] [ 21646: 21646] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.501887 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.506643 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.512264 678849 usertrap_amd64.go:212] [ 21647: 21647] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.512331 678849 usertrap_amd64.go:122] [ 21647: 21647] Allocate a new trap: 0xc009d9a0f0 39 D0307 12:03:06.512410 678849 usertrap_amd64.go:225] [ 21647: 21647] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.526383 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.526702 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.528741 678849 usertrap_amd64.go:212] [ 21648: 21648] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.528842 678849 usertrap_amd64.go:122] [ 21648: 21648] Allocate a new trap: 0xc008046db0 38 D0307 12:03:06.529200 678849 usertrap_amd64.go:225] [ 21648: 21648] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.531013 678849 usertrap_amd64.go:212] [ 21648: 21648] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.531080 678849 usertrap_amd64.go:122] [ 21648: 21648] Allocate a new trap: 0xc008046db0 39 D0307 12:03:06.531148 678849 usertrap_amd64.go:225] [ 21648: 21648] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.532836 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.533196 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.534626 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.534987 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.548453 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.548717 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.554495 678849 usertrap_amd64.go:212] [ 21644: 21644] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.554543 678849 usertrap_amd64.go:122] [ 21644: 21644] Allocate a new trap: 0xc006677290 40 D0307 12:03:06.554609 678849 usertrap_amd64.go:225] [ 21644: 21644] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:06.563975 678849 task_exit.go:204] [ 21644: 21644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.564205 678849 task_signals.go:204] [ 21644: 21650] Signal 21644, PID: 21650, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.564238 678849 task_exit.go:204] [ 21644: 21644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.564462 678849 task_exit.go:204] [ 21644: 21650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.564650 678849 task_signals.go:204] [ 21644: 21649] Signal 21644, PID: 21649, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.564753 678849 task_exit.go:204] [ 21644: 21649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.565049 678849 task_exit.go:204] [ 21644: 21650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.565125 678849 task_exit.go:204] [ 21644: 21650] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.566591 678849 usertrap_amd64.go:212] [ 21648: 21648] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.566730 678849 task_exit.go:204] [ 21644: 21649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.566742 678849 usertrap_amd64.go:122] [ 21648: 21648] Allocate a new trap: 0xc008046db0 40 D0307 12:03:06.566776 678849 task_exit.go:204] [ 21644: 21649] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.566868 678849 usertrap_amd64.go:225] [ 21648: 21648] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.566898 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.572821 678849 task_exit.go:204] [ 21644: 21644] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async, rerun: 32) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (rerun: 32) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x7ff}, 0xb) D0307 12:03:06.582052 678849 task_exit.go:204] [ 21648: 21648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.582361 678849 task_exit.go:204] [ 21648: 21648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.582619 678849 task_signals.go:204] [ 21648: 21651] Signal 21648, PID: 21651, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.582732 678849 task_exit.go:204] [ 21648: 21651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.584449 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.584523 678849 task_exit.go:204] [ 21648: 21651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.584567 678849 task_exit.go:204] [ 21648: 21651] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.584666 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.585030 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.587235 678849 task_exit.go:204] [ 21648: 21648] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:06.591488 678849 usertrap_amd64.go:212] [ 21647: 21647] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:06.591557 678849 usertrap_amd64.go:122] [ 21647: 21647] Allocate a new trap: 0xc009d9a0f0 40 D0307 12:03:06.591616 678849 usertrap_amd64.go:225] [ 21647: 21647] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.600179 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.600652 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.602912 678849 usertrap_amd64.go:212] [ 21646: 21646] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.603003 678849 usertrap_amd64.go:122] [ 21646: 21646] Allocate a new trap: 0xc0098d6360 40 D0307 12:03:06.603067 678849 usertrap_amd64.go:225] [ 21646: 21646] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.607649 678849 task_exit.go:204] [ 21646: 21646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.607930 678849 task_signals.go:204] [ 21646: 21653] Signal 21646, PID: 21653, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.608166 678849 task_exit.go:204] [ 21646: 21653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.608328 678849 task_exit.go:204] [ 21646: 21646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.614337 678849 task_exit.go:204] [ 21646: 21653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.614434 678849 task_exit.go:204] [ 21646: 21653] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.614538 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.614811 678849 task_exit.go:204] [ 21646: 21646] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 1: inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) accept$packet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:06.624685 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.625199 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.626359 678849 usertrap_amd64.go:212] [ 21647: 21647] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.626487 678849 usertrap_amd64.go:122] [ 21647: 21647] Allocate a new trap: 0xc009d9a0f0 41 D0307 12:03:06.626614 678849 usertrap_amd64.go:225] [ 21647: 21647] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:06.629273 678849 task_exit.go:204] [ 21647: 21647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.629517 678849 task_exit.go:204] [ 21647: 21647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.630161 678849 usertrap_amd64.go:212] [ 21655: 21655] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.630447 678849 usertrap_amd64.go:122] [ 21655: 21655] Allocate a new trap: 0xc0014c6d50 38 D0307 12:03:06.631366 678849 usertrap_amd64.go:225] [ 21655: 21655] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.631581 678849 task_signals.go:204] [ 21647: 21652] Signal 21647, PID: 21652, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.631712 678849 task_exit.go:204] [ 21647: 21652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.632072 678849 task_signals.go:204] [ 21647: 21654] Signal 21647, PID: 21654, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.632181 678849 task_exit.go:204] [ 21647: 21652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.632298 678849 task_exit.go:204] [ 21647: 21652] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.632582 678849 task_exit.go:204] [ 21647: 21654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.635119 678849 task_exit.go:204] [ 21647: 21654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.635216 678849 task_exit.go:204] [ 21647: 21654] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.635347 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.635811 678849 task_exit.go:204] [ 21647: 21647] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) D0307 12:03:06.639073 678849 usertrap_amd64.go:212] [ 21655: 21655] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.639222 678849 usertrap_amd64.go:122] [ 21655: 21655] Allocate a new trap: 0xc0014c6d50 39 D0307 12:03:06.639406 678849 usertrap_amd64.go:225] [ 21655: 21655] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.643798 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.644409 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.645885 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.646262 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.648383 678849 usertrap_amd64.go:212] [ 21656: 21656] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.648490 678849 usertrap_amd64.go:122] [ 21656: 21656] Allocate a new trap: 0xc0014c6d80 38 D0307 12:03:06.649004 678849 usertrap_amd64.go:225] [ 21656: 21656] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.653090 678849 usertrap_amd64.go:212] [ 21656: 21656] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.653176 678849 usertrap_amd64.go:122] [ 21656: 21656] Allocate a new trap: 0xc0014c6d80 39 D0307 12:03:06.653377 678849 usertrap_amd64.go:225] [ 21656: 21656] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.656303 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.656687 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.670491 678849 usertrap_amd64.go:212] [ 21658: 21658] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.670590 678849 usertrap_amd64.go:122] [ 21658: 21658] Allocate a new trap: 0xc007c7b290 38 D0307 12:03:06.670958 678849 usertrap_amd64.go:225] [ 21658: 21658] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.672691 678849 usertrap_amd64.go:212] [ 21658: 21658] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.672762 678849 usertrap_amd64.go:122] [ 21658: 21658] Allocate a new trap: 0xc007c7b290 39 D0307 12:03:06.672889 678849 usertrap_amd64.go:225] [ 21658: 21658] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.675984 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.677151 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.677697 678849 usertrap_amd64.go:212] [ 21657: 21657] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.677784 678849 usertrap_amd64.go:122] [ 21657: 21657] Allocate a new trap: 0xc001431110 38 D0307 12:03:06.678248 678849 usertrap_amd64.go:225] [ 21657: 21657] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.678811 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.679250 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.680481 678849 usertrap_amd64.go:212] [ 21656: 21656] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.680572 678849 usertrap_amd64.go:122] [ 21656: 21656] Allocate a new trap: 0xc0014c6d80 40 D0307 12:03:06.680680 678849 usertrap_amd64.go:225] [ 21656: 21656] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.680692 678849 usertrap_amd64.go:212] [ 21657: 21657] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.680784 678849 usertrap_amd64.go:122] [ 21657: 21657] Allocate a new trap: 0xc001431110 39 D0307 12:03:06.680860 678849 usertrap_amd64.go:225] [ 21657: 21657] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.683094 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.683471 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.685606 678849 task_exit.go:204] [ 21656: 21656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.685968 678849 task_exit.go:204] [ 21656: 21656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.685947 678849 task_signals.go:204] [ 21656: 21660] Signal 21656, PID: 21660, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.686083 678849 task_exit.go:204] [ 21656: 21660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.688001 678849 task_exit.go:204] [ 21656: 21660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.688073 678849 task_exit.go:204] [ 21656: 21660] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.688144 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.689495 678849 task_exit.go:204] [ 21656: 21656] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x21}, &(0x7f00000001c0)) D0307 12:03:06.702344 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.702874 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.703314 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.703674 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.704164 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.704349 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.704613 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.704919 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.705215 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.705560 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.706272 678849 usertrap_amd64.go:212] [ 21658: 21658] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.706475 678849 usertrap_amd64.go:122] [ 21658: 21658] Allocate a new trap: 0xc007c7b290 40 D0307 12:03:06.706503 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.706691 678849 usertrap_amd64.go:225] [ 21658: 21658] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.707098 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.707732 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.708015 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.708329 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.708568 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.708900 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.709211 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.709544 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.709778 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.710102 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.710345 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.710757 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.710972 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.711321 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.711529 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.711902 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.712148 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.712436 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.713130 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.713469 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.713706 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.713995 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.714233 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.714508 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.714727 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.714941 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.715168 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.715477 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.715846 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.716347 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.716627 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.717137 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.717381 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.717739 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.717990 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.718416 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.718652 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.719759 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.720007 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.720334 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.720580 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.721074 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.721280 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.721879 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.722106 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.722541 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.723223 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.723706 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.723945 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.724218 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.724472 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.724912 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.725223 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.725622 678849 usertrap_amd64.go:212] [ 21657: 21657] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.725704 678849 usertrap_amd64.go:122] [ 21657: 21657] Allocate a new trap: 0xc001431110 40 D0307 12:03:06.725783 678849 usertrap_amd64.go:225] [ 21657: 21657] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.725977 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.726277 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.726732 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.726997 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.727732 678849 task_exit.go:204] [ 21658: 21658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.727893 678849 task_signals.go:204] [ 21658: 21663] Signal 21658, PID: 21663, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.728127 678849 task_exit.go:204] [ 21658: 21663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.727960 678849 task_signals.go:204] [ 21658: 21662] Signal 21658, PID: 21662, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.728355 678849 task_exit.go:204] [ 21658: 21662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.728718 678849 task_exit.go:204] [ 21658: 21662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.728767 678849 task_exit.go:204] [ 21658: 21662] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.729525 678849 task_exit.go:204] [ 21658: 21663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.729597 678849 task_exit.go:204] [ 21658: 21663] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.729734 678849 usertrap_amd64.go:212] [ 21655: 21655] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.729831 678849 usertrap_amd64.go:122] [ 21655: 21655] Allocate a new trap: 0xc0014c6d50 40 D0307 12:03:06.730019 678849 usertrap_amd64.go:225] [ 21655: 21655] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:06.732077 678849 task_exit.go:204] [ 21658: 21658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.732176 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.732687 678849 task_exit.go:204] [ 21658: 21658] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x6, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x717, 0x20, 0xa274, 0x0, {{0xb, 0x4, 0x0, 0x1a, 0x2c, 0x68, 0x0, 0x1, 0x29, 0x0, @remote, @remote, {[@ssrr={0x89, 0xb, 0xd, [@local, @remote]}, @timestamp_addr={0x44, 0xc, 0x87, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x59a}]}]}}}}}) D0307 12:03:06.734705 678849 task_exit.go:204] [ 21657: 21657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.734997 678849 task_signals.go:204] [ 21657: 21664] Signal 21657, PID: 21664, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.735009 678849 task_exit.go:204] [ 21657: 21657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.736099 678849 task_exit.go:204] [ 21657: 21664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.738243 678849 task_exit.go:204] [ 21657: 21664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.738312 678849 task_exit.go:204] [ 21657: 21664] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.738413 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.738631 678849 task_exit.go:204] [ 21657: 21657] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 1: inotify_rm_watch(0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:06.745287 678849 task_exit.go:204] [ 21655: 21655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.745493 678849 task_signals.go:204] [ 21655: 21661] Signal 21655, PID: 21661, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.745591 678849 task_exit.go:204] [ 21655: 21655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.745970 678849 task_exit.go:204] [ 21655: 21661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.746200 678849 task_signals.go:204] [ 21655: 21659] Signal 21655, PID: 21659, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.746367 678849 task_exit.go:204] [ 21655: 21659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.746697 678849 task_exit.go:204] [ 21655: 21661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.746789 678849 task_exit.go:204] [ 21655: 21661] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.747488 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.747931 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.748343 678849 usertrap_amd64.go:212] [ 21665: 21665] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.748428 678849 usertrap_amd64.go:122] [ 21665: 21665] Allocate a new trap: 0xc006677410 38 D0307 12:03:06.748821 678849 usertrap_amd64.go:225] [ 21665: 21665] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.750973 678849 task_exit.go:204] [ 21655: 21659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.751277 678849 task_exit.go:204] [ 21655: 21659] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.751811 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.751943 678849 usertrap_amd64.go:212] [ 21665: 21665] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.752038 678849 usertrap_amd64.go:122] [ 21665: 21665] Allocate a new trap: 0xc006677410 39 D0307 12:03:06.752130 678849 usertrap_amd64.go:225] [ 21665: 21665] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:06.752387 678849 task_exit.go:204] [ 21655: 21655] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.754162 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.754518 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/210, 0xd2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000180)) read$char_usb(r3, &(0x7f0000000100)=""/41, 0x29) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) write$cgroup_devices(r5, &(0x7f0000000240)={'b', ' *:* ', 'rwm\x00'}, 0xa) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x6) D0307 12:03:06.760241 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.760558 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.765926 678849 task_signals.go:470] [ 8: 14] Notified of signal 23 D0307 12:03:06.766327 678849 task_signals.go:220] [ 8: 14] Signal 23: delivering to handler D0307 12:03:06.769177 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.769459 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.771178 678849 task_signals.go:470] [ 8: 14] Notified of signal 23 D0307 12:03:06.771794 678849 task_signals.go:179] [ 8: 14] Restarting syscall 202: interrupted by signal 23 D0307 12:03:06.771864 678849 task_signals.go:220] [ 8: 14] Signal 23: delivering to handler D0307 12:03:06.789747 678849 usertrap_amd64.go:212] [ 21666: 21666] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.789920 678849 usertrap_amd64.go:122] [ 21666: 21666] Allocate a new trap: 0xc007c7b380 38 D0307 12:03:06.790347 678849 usertrap_amd64.go:225] [ 21666: 21666] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.791517 678849 usertrap_amd64.go:212] [ 21665: 21665] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.791586 678849 usertrap_amd64.go:122] [ 21665: 21665] Allocate a new trap: 0xc006677410 40 D0307 12:03:06.791678 678849 usertrap_amd64.go:225] [ 21665: 21665] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.793097 678849 usertrap_amd64.go:212] [ 21667: 21667] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.793330 678849 usertrap_amd64.go:122] [ 21667: 21667] Allocate a new trap: 0xc0098d6450 38 D0307 12:03:06.793772 678849 usertrap_amd64.go:225] [ 21667: 21667] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.793939 678849 task_exit.go:204] [ 21665: 21665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.794312 678849 task_exit.go:204] [ 21665: 21665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.794552 678849 task_signals.go:204] [ 21665: 21669] Signal 21665, PID: 21669, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.794684 678849 task_exit.go:204] [ 21665: 21669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.796018 678849 usertrap_amd64.go:212] [ 21667: 21667] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.796087 678849 usertrap_amd64.go:122] [ 21667: 21667] Allocate a new trap: 0xc0098d6450 39 D0307 12:03:06.796164 678849 usertrap_amd64.go:225] [ 21667: 21667] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.797260 678849 task_exit.go:204] [ 21665: 21669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.797318 678849 task_exit.go:204] [ 21665: 21669] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.797387 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.798258 678849 task_exit.go:204] [ 21665: 21665] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.799729 678849 usertrap_amd64.go:212] [ 21666: 21666] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.799715 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.799817 678849 usertrap_amd64.go:122] [ 21666: 21666] Allocate a new trap: 0xc007c7b380 39 D0307 12:03:06.799942 678849 usertrap_amd64.go:225] [ 21666: 21666] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) 12:03:06 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:06.800169 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.802076 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.802423 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.804173 678849 usertrap_amd64.go:212] [ 21668: 21668] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.804344 678849 usertrap_amd64.go:122] [ 21668: 21668] Allocate a new trap: 0xc006677500 38 D0307 12:03:06.804901 678849 usertrap_amd64.go:225] [ 21668: 21668] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.806171 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.806575 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.810166 678849 usertrap_amd64.go:212] [ 21668: 21668] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.810232 678849 usertrap_amd64.go:122] [ 21668: 21668] Allocate a new trap: 0xc006677500 39 D0307 12:03:06.810437 678849 usertrap_amd64.go:225] [ 21668: 21668] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.818353 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.818691 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.863347 678849 usertrap_amd64.go:212] [ 21667: 21667] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.863587 678849 usertrap_amd64.go:122] [ 21667: 21667] Allocate a new trap: 0xc0098d6450 40 D0307 12:03:06.863691 678849 usertrap_amd64.go:225] [ 21667: 21667] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.864464 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.864982 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.866282 678849 usertrap_amd64.go:212] [ 21666: 21666] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:06.866425 678849 usertrap_amd64.go:122] [ 21666: 21666] Allocate a new trap: 0xc007c7b380 40 D0307 12:03:06.866497 678849 usertrap_amd64.go:225] [ 21666: 21666] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:06.867212 678849 task_exit.go:204] [ 21667: 21667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.867211 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.867364 678849 usertrap_amd64.go:212] [ 21670: 21670] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.867417 678849 task_signals.go:204] [ 21667: 21671] Signal 21667, PID: 21671, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.867477 678849 usertrap_amd64.go:122] [ 21670: 21670] Allocate a new trap: 0xc008047170 38 D0307 12:03:06.867486 678849 task_exit.go:204] [ 21667: 21667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.867684 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.867919 678849 usertrap_amd64.go:225] [ 21670: 21670] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.869029 678849 task_exit.go:204] [ 21667: 21671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.870834 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.871227 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.871411 678849 task_exit.go:204] [ 21667: 21671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.871461 678849 task_exit.go:204] [ 21667: 21671] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.871551 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:06.872016 678849 task_exit.go:204] [ 21667: 21667] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.873633 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.874459 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.875985 678849 usertrap_amd64.go:212] [ 21670: 21670] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:06.876139 678849 usertrap_amd64.go:122] [ 21670: 21670] Allocate a new trap: 0xc008047170 39 D0307 12:03:06.876323 678849 usertrap_amd64.go:225] [ 21670: 21670] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) 12:03:06 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x6, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x717, 0x20, 0xa274, 0x0, {{0xb, 0x4, 0x0, 0x1a, 0x2c, 0x68, 0x0, 0x1, 0x29, 0x0, @remote, @remote, {[@ssrr={0x89, 0xb, 0xd, [@local, @remote]}, @timestamp_addr={0x44, 0xc, 0x87, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x59a}]}]}}}}}) D0307 12:03:06.878741 678849 task_exit.go:204] [ 21666: 21666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.878924 678849 task_signals.go:204] [ 21666: 21673] Signal 21666, PID: 21673, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.879034 678849 task_exit.go:204] [ 21666: 21666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.879157 678849 task_exit.go:204] [ 21666: 21673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.882097 678849 task_exit.go:204] [ 21666: 21673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.882194 678849 task_exit.go:204] [ 21666: 21673] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.882306 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:06.882823 678849 task_exit.go:204] [ 21666: 21666] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 1: inotify_rm_watch(0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:06.889016 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.889173 678849 usertrap_amd64.go:212] [ 21668: 21668] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:06.889272 678849 usertrap_amd64.go:122] [ 21668: 21668] Allocate a new trap: 0xc006677500 40 D0307 12:03:06.889342 678849 usertrap_amd64.go:225] [ 21668: 21668] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:06.889394 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.895536 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.896095 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.898947 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.899309 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.913904 678849 task_exit.go:204] [ 21668: 21668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.914192 678849 task_exit.go:204] [ 21668: 21668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.914841 678849 task_signals.go:204] [ 21668: 21672] Signal 21668, PID: 21672, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.915008 678849 task_exit.go:204] [ 21668: 21672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.917780 678849 task_exit.go:204] [ 21668: 21672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.917853 678849 task_exit.go:204] [ 21668: 21672] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.917999 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:06.920130 678849 task_exit.go:204] [ 21668: 21668] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/210, 0xd2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000180)) read$char_usb(r3, &(0x7f0000000100)=""/41, 0x29) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) write$cgroup_devices(r5, &(0x7f0000000240)={'b', ' *:* ', 'rwm\x00'}, 0xa) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x6) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) read$char_usb(r1, &(0x7f0000000000)=""/210, 0xd2) (async) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r3, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401, 0x0) (async) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000180)) (async) read$char_usb(r3, &(0x7f0000000100)=""/41, 0x29) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) (async) write$cgroup_devices(r5, &(0x7f0000000240)={'b', ' *:* ', 'rwm\x00'}, 0xa) (async) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x6) (async) D0307 12:03:06.921613 678849 usertrap_amd64.go:212] [ 21670: 21670] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:06.921810 678849 usertrap_amd64.go:122] [ 21670: 21670] Allocate a new trap: 0xc008047170 40 D0307 12:03:06.921957 678849 usertrap_amd64.go:225] [ 21670: 21670] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:06.926666 678849 task_exit.go:204] [ 21670: 21670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.927044 678849 task_signals.go:204] [ 21670: 21674] Signal 21670, PID: 21674, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.927108 678849 task_exit.go:204] [ 21670: 21670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.927284 678849 task_exit.go:204] [ 21670: 21674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.927507 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.927835 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.930910 678849 task_exit.go:204] [ 21670: 21674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.931146 678849 task_exit.go:204] [ 21670: 21674] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.931336 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:06.932507 678849 task_exit.go:204] [ 21670: 21670] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:06 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:06.935421 678849 usertrap_amd64.go:212] [ 21676: 21676] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:06.935553 678849 usertrap_amd64.go:122] [ 21676: 21676] Allocate a new trap: 0xc008046150 38 D0307 12:03:06.936035 678849 usertrap_amd64.go:225] [ 21676: 21676] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:06.943241 678849 usertrap_amd64.go:212] [ 21676: 21676] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:06.943364 678849 usertrap_amd64.go:122] [ 21676: 21676] Allocate a new trap: 0xc008046150 39 D0307 12:03:06.943477 678849 usertrap_amd64.go:225] [ 21676: 21676] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:06.945226 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.945717 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.951221 678849 usertrap_amd64.go:212] [ 21675: 21675] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:06.951349 678849 usertrap_amd64.go:122] [ 21675: 21675] Allocate a new trap: 0xc007c7a060 38 D0307 12:03:06.951708 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.951784 678849 usertrap_amd64.go:212] [ 21677: 21677] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:06.951947 678849 usertrap_amd64.go:122] [ 21677: 21677] Allocate a new trap: 0xc001430090 38 D0307 12:03:06.952078 678849 usertrap_amd64.go:225] [ 21675: 21675] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:06.952275 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.952345 678849 usertrap_amd64.go:225] [ 21677: 21677] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:06.954229 678849 usertrap_amd64.go:212] [ 21675: 21675] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:06.954297 678849 usertrap_amd64.go:122] [ 21675: 21675] Allocate a new trap: 0xc007c7a060 39 D0307 12:03:06.954370 678849 usertrap_amd64.go:225] [ 21675: 21675] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:06.955252 678849 usertrap_amd64.go:212] [ 21677: 21677] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:06.955319 678849 usertrap_amd64.go:122] [ 21677: 21677] Allocate a new trap: 0xc001430090 39 D0307 12:03:06.955512 678849 usertrap_amd64.go:225] [ 21677: 21677] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:06.956479 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.956913 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.958403 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:06.958770 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.987142 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.987428 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.988235 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.988503 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.988499 678849 usertrap_amd64.go:212] [ 21676: 21676] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:06.988649 678849 usertrap_amd64.go:122] [ 21676: 21676] Allocate a new trap: 0xc008046150 40 D0307 12:03:06.988773 678849 usertrap_amd64.go:225] [ 21676: 21676] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:06.991047 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.991256 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.993398 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.993734 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:06.995715 678849 usertrap_amd64.go:212] [ 21678: 21678] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:06.995830 678849 usertrap_amd64.go:122] [ 21678: 21678] Allocate a new trap: 0xc008f96090 38 D0307 12:03:06.996299 678849 usertrap_amd64.go:225] [ 21678: 21678] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:06.997071 678849 task_exit.go:204] [ 21676: 21676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.997252 678849 task_signals.go:204] [ 21676: 21682] Signal 21676, PID: 21682, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.997363 678849 task_exit.go:204] [ 21676: 21682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.997686 678849 task_signals.go:204] [ 21676: 21681] Signal 21676, PID: 21681, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:06.997909 678849 task_exit.go:204] [ 21676: 21676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.998103 678849 task_exit.go:204] [ 21676: 21682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:06.998100 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:06.998153 678849 task_exit.go:204] [ 21676: 21682] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:06.998291 678849 task_exit.go:204] [ 21676: 21681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:06.998395 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.000926 678849 task_exit.go:204] [ 21676: 21681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.001445 678849 task_exit.go:204] [ 21676: 21681] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.001551 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.001851 678849 task_exit.go:204] [ 21676: 21676] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x6, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x717, 0x20, 0xa274, 0x0, {{0xb, 0x4, 0x0, 0x1a, 0x2c, 0x68, 0x0, 0x1, 0x29, 0x0, @remote, @remote, {[@ssrr={0x89, 0xb, 0xd, [@local, @remote]}, @timestamp_addr={0x44, 0xc, 0x87, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x59a}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x717, 0x20, 0xa274, 0x0, {{0xb, 0x4, 0x0, 0x1a, 0x2c, 0x68, 0x0, 0x1, 0x29, 0x0, @remote, @remote, {[@ssrr={0x89, 0xb, 0xd, [@local, @remote]}, @timestamp_addr={0x44, 0xc, 0x87, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x59a}]}]}}}}}) D0307 12:03:07.003473 678849 usertrap_amd64.go:212] [ 21678: 21678] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.003553 678849 usertrap_amd64.go:122] [ 21678: 21678] Allocate a new trap: 0xc008f96090 39 D0307 12:03:07.003635 678849 usertrap_amd64.go:225] [ 21678: 21678] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.006131 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.006561 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.009261 678849 usertrap_amd64.go:212] [ 21675: 21675] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.009352 678849 usertrap_amd64.go:122] [ 21675: 21675] Allocate a new trap: 0xc007c7a060 40 D0307 12:03:07.009446 678849 usertrap_amd64.go:225] [ 21675: 21675] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.011918 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.012179 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.012433 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.012680 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.015336 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.015698 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.020745 678849 task_exit.go:204] [ 21675: 21675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.020927 678849 task_exit.go:204] [ 21675: 21675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.022642 678849 task_signals.go:204] [ 21675: 21679] Signal 21675, PID: 21679, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.022822 678849 task_exit.go:204] [ 21675: 21679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.025428 678849 task_exit.go:204] [ 21675: 21679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.025524 678849 task_exit.go:204] [ 21675: 21679] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.025619 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 12:03:07 executing program 1: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) D0307 12:03:07.026272 678849 task_exit.go:204] [ 21675: 21675] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.040874 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.041566 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.043170 678849 usertrap_amd64.go:212] [ 21678: 21678] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.043253 678849 usertrap_amd64.go:122] [ 21678: 21678] Allocate a new trap: 0xc008f96090 40 D0307 12:03:07.043312 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.043375 678849 usertrap_amd64.go:225] [ 21678: 21678] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.043581 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.047334 678849 usertrap_amd64.go:212] [ 21677: 21677] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:07.047412 678849 usertrap_amd64.go:122] [ 21677: 21677] Allocate a new trap: 0xc001430090 40 D0307 12:03:07.047496 678849 usertrap_amd64.go:225] [ 21677: 21677] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.047673 678849 task_exit.go:204] [ 21678: 21678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.047873 678849 task_exit.go:204] [ 21678: 21678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.048061 678849 task_signals.go:204] [ 21678: 21687] Signal 21678, PID: 21687, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.048256 678849 task_exit.go:204] [ 21678: 21687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.051888 678849 task_exit.go:204] [ 21678: 21687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.052026 678849 task_exit.go:204] [ 21678: 21687] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.052129 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.053056 678849 task_exit.go:204] [ 21678: 21678] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:07.064561 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.064702 678849 usertrap_amd64.go:212] [ 21688: 21688] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.064809 678849 usertrap_amd64.go:122] [ 21688: 21688] Allocate a new trap: 0xc0014c60c0 38 D0307 12:03:07.065148 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.065415 678849 usertrap_amd64.go:225] [ 21688: 21688] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.068486 678849 usertrap_amd64.go:212] [ 21688: 21688] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.068551 678849 usertrap_amd64.go:122] [ 21688: 21688] Allocate a new trap: 0xc0014c60c0 39 D0307 12:03:07.068663 678849 usertrap_amd64.go:225] [ 21688: 21688] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.071667 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.072627 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.075712 678849 usertrap_amd64.go:212] [ 21677: 21677] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.075788 678849 usertrap_amd64.go:122] [ 21677: 21677] Allocate a new trap: 0xc001430090 41 D0307 12:03:07.075863 678849 usertrap_amd64.go:225] [ 21677: 21677] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:07.096252 678849 usertrap_amd64.go:212] [ 21691: 21691] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.096363 678849 usertrap_amd64.go:122] [ 21691: 21691] Allocate a new trap: 0xc007c7a2a0 38 D0307 12:03:07.096856 678849 usertrap_amd64.go:225] [ 21691: 21691] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.097483 678849 task_exit.go:204] [ 21677: 21677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.097684 678849 task_signals.go:204] [ 21677: 21686] Signal 21677, PID: 21686, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.097764 678849 task_signals.go:204] [ 21677: 21685] Signal 21677, PID: 21685, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.097767 678849 usertrap_amd64.go:212] [ 21690: 21690] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.097830 678849 task_signals.go:204] [ 21677: 21683] Signal 21677, PID: 21683, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.097815 678849 task_signals.go:204] [ 21677: 21689] Signal 21677, PID: 21689, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.097888 678849 task_exit.go:204] [ 21677: 21686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.097897 678849 usertrap_amd64.go:122] [ 21690: 21690] Allocate a new trap: 0xc000a0e150 38 D0307 12:03:07.098022 678849 task_signals.go:204] [ 21677: 21680] Signal 21677, PID: 21680, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.098146 678849 task_signals.go:204] [ 21677: 21684] Signal 21677, PID: 21684, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.098161 678849 task_exit.go:204] [ 21677: 21680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.098415 678849 task_exit.go:204] [ 21677: 21684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.098603 678849 task_exit.go:204] [ 21677: 21685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.098633 678849 usertrap_amd64.go:225] [ 21690: 21690] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.098790 678849 task_exit.go:204] [ 21677: 21685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.099025 678849 task_exit.go:204] [ 21677: 21685] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.099254 678849 task_exit.go:204] [ 21677: 21683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.099561 678849 task_exit.go:204] [ 21677: 21683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.099619 678849 task_exit.go:204] [ 21677: 21683] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.099748 678849 task_exit.go:204] [ 21677: 21686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.099812 678849 task_exit.go:204] [ 21677: 21686] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.100028 678849 task_exit.go:204] [ 21677: 21677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.100137 678849 task_exit.go:204] [ 21677: 21689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.100227 678849 task_exit.go:204] [ 21677: 21680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.100258 678849 task_exit.go:204] [ 21677: 21680] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.100351 678849 task_exit.go:204] [ 21677: 21684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.100377 678849 task_exit.go:204] [ 21677: 21684] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.101785 678849 usertrap_amd64.go:212] [ 21690: 21690] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.101879 678849 usertrap_amd64.go:122] [ 21690: 21690] Allocate a new trap: 0xc000a0e150 39 D0307 12:03:07.101972 678849 usertrap_amd64.go:225] [ 21690: 21690] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.103349 678849 task_exit.go:204] [ 21677: 21689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.103442 678849 task_exit.go:204] [ 21677: 21689] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.103591 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.103846 678849 task_exit.go:204] [ 21677: 21677] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f0000000000)=""/210, 0xd2) (async) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x401, 0x0) (async) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000180)) (async) read$char_usb(r3, &(0x7f0000000100)=""/41, 0x29) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) write$cgroup_devices(r5, &(0x7f0000000240)={'b', ' *:* ', 'rwm\x00'}, 0xa) (async) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x6) D0307 12:03:07.113238 678849 usertrap_amd64.go:212] [ 21691: 21691] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.113325 678849 usertrap_amd64.go:122] [ 21691: 21691] Allocate a new trap: 0xc007c7a2a0 39 D0307 12:03:07.113405 678849 usertrap_amd64.go:225] [ 21691: 21691] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.117298 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.119590 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.119795 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.120100 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.143604 678849 usertrap_amd64.go:212] [ 21688: 21688] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.143703 678849 usertrap_amd64.go:122] [ 21688: 21688] Allocate a new trap: 0xc0014c60c0 40 D0307 12:03:07.143787 678849 usertrap_amd64.go:225] [ 21688: 21688] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.150470 678849 task_exit.go:204] [ 21688: 21688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.150771 678849 task_exit.go:204] [ 21688: 21688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.150713 678849 task_signals.go:204] [ 21688: 21692] Signal 21688, PID: 21692, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.150952 678849 task_exit.go:204] [ 21688: 21692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.151169 678849 task_signals.go:204] [ 21688: 21693] Signal 21688, PID: 21693, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.151281 678849 task_exit.go:204] [ 21688: 21693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.151633 678849 task_exit.go:204] [ 21688: 21692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.151705 678849 task_exit.go:204] [ 21688: 21692] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.153214 678849 task_exit.go:204] [ 21688: 21693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.153306 678849 task_exit.go:204] [ 21688: 21693] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.153420 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.153682 678849 task_exit.go:204] [ 21688: 21688] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.153949 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.154186 678849 usertrap_amd64.go:212] [ 21691: 21691] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.154242 678849 usertrap_amd64.go:122] [ 21691: 21691] Allocate a new trap: 0xc007c7a2a0 40 D0307 12:03:07.154307 678849 usertrap_amd64.go:225] [ 21691: 21691] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.154319 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.156370 678849 task_exit.go:204] [ 21691: 21691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.156725 678849 task_signals.go:204] [ 21691: 21694] Signal 21691, PID: 21694, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.156743 678849 task_exit.go:204] [ 21691: 21691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.157019 678849 task_exit.go:204] [ 21691: 21694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.164196 678849 task_exit.go:204] [ 21691: 21694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.164295 678849 task_exit.go:204] [ 21691: 21694] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.164378 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.165445 678849 task_exit.go:204] [ 21691: 21691] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180), &(0x7f00000001c0)) D0307 12:03:07.175688 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.176159 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.176526 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.178440 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.194911 678849 usertrap_amd64.go:212] [ 21690: 21690] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.195036 678849 usertrap_amd64.go:122] [ 21690: 21690] Allocate a new trap: 0xc000a0e150 40 D0307 12:03:07.195099 678849 usertrap_amd64.go:225] [ 21690: 21690] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.208849 678849 task_exit.go:204] [ 21690: 21690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.209222 678849 task_signals.go:204] [ 21690: 21696] Signal 21690, PID: 21696, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.209337 678849 task_exit.go:204] [ 21690: 21696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.209650 678849 task_exit.go:204] [ 21690: 21690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.211157 678849 usertrap_amd64.go:212] [ 21697: 21697] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.211267 678849 usertrap_amd64.go:122] [ 21697: 21697] Allocate a new trap: 0xc0014c6420 38 D0307 12:03:07.211663 678849 usertrap_amd64.go:225] [ 21697: 21697] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.211683 678849 task_exit.go:204] [ 21690: 21696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.211759 678849 task_exit.go:204] [ 21690: 21696] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.211866 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.211999 678849 task_exit.go:204] [ 21690: 21690] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) D0307 12:03:07.218821 678849 usertrap_amd64.go:212] [ 21697: 21697] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.218894 678849 usertrap_amd64.go:122] [ 21697: 21697] Allocate a new trap: 0xc0014c6420 39 D0307 12:03:07.218951 678849 usertrap_amd64.go:212] [ 21695: 21695] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.218965 678849 usertrap_amd64.go:225] [ 21697: 21697] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.219070 678849 usertrap_amd64.go:122] [ 21695: 21695] Allocate a new trap: 0xc0015da2a0 38 D0307 12:03:07.219541 678849 usertrap_amd64.go:225] [ 21695: 21695] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.221059 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.221369 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.221742 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.221941 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.225448 678849 usertrap_amd64.go:212] [ 21698: 21698] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.225559 678849 usertrap_amd64.go:122] [ 21698: 21698] Allocate a new trap: 0xc000a0e240 38 D0307 12:03:07.225921 678849 usertrap_amd64.go:225] [ 21698: 21698] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.227869 678849 usertrap_amd64.go:212] [ 21695: 21695] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.227972 678849 usertrap_amd64.go:122] [ 21695: 21695] Allocate a new trap: 0xc0015da2a0 39 D0307 12:03:07.228046 678849 usertrap_amd64.go:225] [ 21695: 21695] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.228552 678849 usertrap_amd64.go:212] [ 21698: 21698] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.228642 678849 usertrap_amd64.go:122] [ 21698: 21698] Allocate a new trap: 0xc000a0e240 39 D0307 12:03:07.228743 678849 usertrap_amd64.go:225] [ 21698: 21698] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.230869 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.231434 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.231633 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.234427 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.250978 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.251490 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.252451 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.252861 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.253191 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.253775 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.254834 678849 usertrap_amd64.go:212] [ 21699: 21699] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.254960 678849 usertrap_amd64.go:122] [ 21699: 21699] Allocate a new trap: 0xc0098d6390 38 D0307 12:03:07.255455 678849 usertrap_amd64.go:225] [ 21699: 21699] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.259268 678849 usertrap_amd64.go:212] [ 21697: 21697] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.259333 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.259388 678849 usertrap_amd64.go:122] [ 21697: 21697] Allocate a new trap: 0xc0014c6420 40 D0307 12:03:07.259490 678849 usertrap_amd64.go:225] [ 21697: 21697] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.259707 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.262270 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.262632 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.267507 678849 task_exit.go:204] [ 21697: 21697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.267762 678849 task_exit.go:204] [ 21697: 21697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.267753 678849 task_signals.go:204] [ 21697: 21700] Signal 21697, PID: 21700, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.267987 678849 task_exit.go:204] [ 21697: 21700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.269991 678849 task_exit.go:204] [ 21697: 21700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.270173 678849 task_exit.go:204] [ 21697: 21700] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.270818 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.271399 678849 task_exit.go:204] [ 21697: 21697] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) (async) inotify_rm_watch(r0, r1) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) (async) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.276046 678849 usertrap_amd64.go:212] [ 21698: 21698] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.276148 678849 usertrap_amd64.go:122] [ 21698: 21698] Allocate a new trap: 0xc000a0e240 40 D0307 12:03:07.276229 678849 usertrap_amd64.go:225] [ 21698: 21698] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.278323 678849 task_exit.go:204] [ 21698: 21698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.278555 678849 task_signals.go:204] [ 21698: 21704] Signal 21698, PID: 21704, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.278934 678849 task_exit.go:204] [ 21698: 21704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.279324 678849 task_exit.go:204] [ 21698: 21704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.279427 678849 task_exit.go:204] [ 21698: 21704] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.282797 678849 usertrap_amd64.go:212] [ 21695: 21695] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:07.282884 678849 usertrap_amd64.go:122] [ 21695: 21695] Allocate a new trap: 0xc0015da2a0 40 D0307 12:03:07.282975 678849 usertrap_amd64.go:225] [ 21695: 21695] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.283050 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.283396 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.284051 678849 task_exit.go:204] [ 21698: 21698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.284244 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.284542 678849 usertrap_amd64.go:212] [ 21699: 21699] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.284631 678849 usertrap_amd64.go:122] [ 21699: 21699] Allocate a new trap: 0xc0098d6390 39 D0307 12:03:07.284603 678849 task_exit.go:204] [ 21698: 21698] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180), &(0x7f00000001c0)) D0307 12:03:07.284699 678849 usertrap_amd64.go:225] [ 21699: 21699] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.292007 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.292331 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.295740 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.296222 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.298743 678849 usertrap_amd64.go:212] [ 21695: 21695] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.298872 678849 usertrap_amd64.go:122] [ 21695: 21695] Allocate a new trap: 0xc0015da2a0 41 D0307 12:03:07.298957 678849 usertrap_amd64.go:225] [ 21695: 21695] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:07.313468 678849 task_exit.go:204] [ 21695: 21695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.313690 678849 task_signals.go:204] [ 21695: 21702] Signal 21695, PID: 21702, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.313672 678849 task_signals.go:204] [ 21695: 21703] Signal 21695, PID: 21703, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.313790 678849 task_exit.go:204] [ 21695: 21695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.314820 678849 task_signals.go:204] [ 21695: 21701] Signal 21695, PID: 21701, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.314942 678849 task_exit.go:204] [ 21695: 21701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.315118 678849 task_exit.go:204] [ 21695: 21701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.315159 678849 task_exit.go:204] [ 21695: 21701] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.315513 678849 task_exit.go:204] [ 21695: 21703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.315623 678849 task_exit.go:204] [ 21695: 21702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.315895 678849 task_exit.go:204] [ 21695: 21702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.315949 678849 task_exit.go:204] [ 21695: 21702] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.316026 678849 usertrap_amd64.go:212] [ 21705: 21705] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.316147 678849 usertrap_amd64.go:122] [ 21705: 21705] Allocate a new trap: 0xc008f96390 38 D0307 12:03:07.317462 678849 usertrap_amd64.go:225] [ 21705: 21705] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.318462 678849 task_exit.go:204] [ 21695: 21703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.318524 678849 task_exit.go:204] [ 21695: 21703] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.318599 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 12:03:07 executing program 3: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xfffffd79) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:07.319189 678849 task_exit.go:204] [ 21695: 21695] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.320467 678849 usertrap_amd64.go:212] [ 21705: 21705] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.320520 678849 usertrap_amd64.go:122] [ 21705: 21705] Allocate a new trap: 0xc008f96390 39 D0307 12:03:07.320601 678849 usertrap_amd64.go:225] [ 21705: 21705] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.325356 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.326163 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.327049 678849 usertrap_amd64.go:212] [ 21699: 21699] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.327062 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.327108 678849 usertrap_amd64.go:122] [ 21699: 21699] Allocate a new trap: 0xc0098d6390 40 D0307 12:03:07.327176 678849 usertrap_amd64.go:225] [ 21699: 21699] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.327389 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.330384 678849 task_exit.go:204] [ 21699: 21699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.330692 678849 task_exit.go:204] [ 21699: 21699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.331008 678849 task_signals.go:204] [ 21699: 21707] Signal 21699, PID: 21707, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.331132 678849 task_exit.go:204] [ 21699: 21707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.338570 678849 task_exit.go:204] [ 21699: 21707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.338655 678849 task_exit.go:204] [ 21699: 21707] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.338730 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.338944 678849 task_exit.go:204] [ 21699: 21699] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.349065 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.349418 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.350196 678849 usertrap_amd64.go:212] [ 21706: 21706] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.350366 678849 usertrap_amd64.go:122] [ 21706: 21706] Allocate a new trap: 0xc0098d6600 38 D0307 12:03:07.351086 678849 usertrap_amd64.go:225] [ 21706: 21706] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.353382 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.353694 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.353899 678849 usertrap_amd64.go:212] [ 21706: 21706] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.354001 678849 usertrap_amd64.go:122] [ 21706: 21706] Allocate a new trap: 0xc0098d6600 39 D0307 12:03:07.354209 678849 usertrap_amd64.go:225] [ 21706: 21706] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.357247 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.357651 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.358487 678849 usertrap_amd64.go:212] [ 21708: 21708] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.358577 678849 usertrap_amd64.go:122] [ 21708: 21708] Allocate a new trap: 0xc0098d6660 38 D0307 12:03:07.358981 678849 usertrap_amd64.go:225] [ 21708: 21708] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.361169 678849 usertrap_amd64.go:212] [ 21708: 21708] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.361233 678849 usertrap_amd64.go:122] [ 21708: 21708] Allocate a new trap: 0xc0098d6660 39 D0307 12:03:07.361305 678849 usertrap_amd64.go:225] [ 21708: 21708] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.363810 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.364063 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.379439 678849 usertrap_amd64.go:212] [ 21706: 21706] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.379577 678849 usertrap_amd64.go:122] [ 21706: 21706] Allocate a new trap: 0xc0098d6600 40 D0307 12:03:07.379663 678849 usertrap_amd64.go:225] [ 21706: 21706] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.381540 678849 task_exit.go:204] [ 21706: 21706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.381749 678849 task_signals.go:204] [ 21706: 21713] Signal 21706, PID: 21713, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.381831 678849 task_exit.go:204] [ 21706: 21706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.382051 678849 task_exit.go:204] [ 21706: 21713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.384283 678849 task_exit.go:204] [ 21706: 21713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.384337 678849 task_exit.go:204] [ 21706: 21713] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.384423 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.388489 678849 task_exit.go:204] [ 21706: 21706] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180), &(0x7f00000001c0)) D0307 12:03:07.391558 678849 usertrap_amd64.go:212] [ 21705: 21705] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:07.391715 678849 usertrap_amd64.go:122] [ 21705: 21705] Allocate a new trap: 0xc008f96390 40 D0307 12:03:07.391833 678849 usertrap_amd64.go:225] [ 21705: 21705] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.397255 678849 usertrap_amd64.go:212] [ 21710: 21710] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.397357 678849 usertrap_amd64.go:122] [ 21710: 21710] Allocate a new trap: 0xc001430360 38 D0307 12:03:07.397546 678849 usertrap_amd64.go:212] [ 21705: 21705] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.397745 678849 usertrap_amd64.go:122] [ 21705: 21705] Allocate a new trap: 0xc008f96390 41 D0307 12:03:07.397761 678849 usertrap_amd64.go:225] [ 21710: 21710] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.398048 678849 usertrap_amd64.go:225] [ 21705: 21705] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:07.399086 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.399640 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.400799 678849 usertrap_amd64.go:212] [ 21708: 21708] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.400928 678849 usertrap_amd64.go:122] [ 21708: 21708] Allocate a new trap: 0xc0098d6660 40 D0307 12:03:07.401087 678849 task_exit.go:204] [ 21705: 21705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.401047 678849 usertrap_amd64.go:225] [ 21708: 21708] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.401162 678849 usertrap_amd64.go:212] [ 21710: 21710] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.401259 678849 usertrap_amd64.go:122] [ 21710: 21710] Allocate a new trap: 0xc001430360 39 D0307 12:03:07.401272 678849 task_signals.go:204] [ 21705: 21711] Signal 21705, PID: 21711, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.401311 678849 task_signals.go:204] [ 21705: 21709] Signal 21705, PID: 21709, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.401389 678849 task_exit.go:204] [ 21705: 21709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.401377 678849 usertrap_amd64.go:225] [ 21710: 21710] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.401515 678849 task_signals.go:204] [ 21705: 21712] Signal 21705, PID: 21712, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.401579 678849 task_exit.go:204] [ 21705: 21711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.401915 678849 task_exit.go:204] [ 21705: 21712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.402172 678849 task_exit.go:204] [ 21705: 21711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.402233 678849 task_exit.go:204] [ 21705: 21711] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.402625 678849 task_exit.go:204] [ 21705: 21709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.402721 678849 task_exit.go:204] [ 21705: 21709] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.402835 678849 task_exit.go:204] [ 21705: 21705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.404243 678849 task_exit.go:204] [ 21708: 21708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.404562 678849 task_exit.go:204] [ 21708: 21708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.404781 678849 task_signals.go:204] [ 21708: 21714] Signal 21708, PID: 21714, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.404989 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.405076 678849 task_exit.go:204] [ 21708: 21714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.405397 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.405534 678849 task_exit.go:204] [ 21705: 21712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.405591 678849 task_exit.go:204] [ 21705: 21712] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.405698 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.407144 678849 task_exit.go:204] [ 21708: 21714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.407225 678849 task_exit.go:204] [ 21708: 21714] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.407841 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.408039 678849 task_exit.go:204] [ 21708: 21708] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.408268 678849 task_exit.go:204] [ 21705: 21705] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 3: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xfffffd79) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 12:03:07 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) (async) semget(0x3, 0x1, 0xafe45a147f0f4904) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) (async) inotify_rm_watch(r0, r1) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) (async) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.415081 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.415407 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.416856 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.417309 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.420305 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.420643 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.432912 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.433728 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.439953 678849 usertrap_amd64.go:212] [ 21710: 21710] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.440055 678849 usertrap_amd64.go:122] [ 21710: 21710] Allocate a new trap: 0xc001430360 40 D0307 12:03:07.440139 678849 usertrap_amd64.go:225] [ 21710: 21710] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.445127 678849 usertrap_amd64.go:212] [ 21716: 21716] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.445265 678849 usertrap_amd64.go:122] [ 21716: 21716] Allocate a new trap: 0xc001430420 38 D0307 12:03:07.445766 678849 usertrap_amd64.go:225] [ 21716: 21716] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.448195 678849 usertrap_amd64.go:212] [ 21716: 21716] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.448261 678849 usertrap_amd64.go:122] [ 21716: 21716] Allocate a new trap: 0xc001430420 39 D0307 12:03:07.448334 678849 usertrap_amd64.go:225] [ 21716: 21716] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.448720 678849 task_exit.go:204] [ 21710: 21710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.448890 678849 task_signals.go:204] [ 21710: 21715] Signal 21710, PID: 21715, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.449084 678849 task_exit.go:204] [ 21710: 21715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.449376 678849 task_exit.go:204] [ 21710: 21710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.451081 678849 task_exit.go:204] [ 21710: 21715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.451147 678849 task_exit.go:204] [ 21710: 21715] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.451252 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.452392 678849 task_exit.go:204] [ 21710: 21710] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.453273 678849 usertrap_amd64.go:212] [ 21717: 21717] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.453386 678849 usertrap_amd64.go:122] [ 21717: 21717] Allocate a new trap: 0xc0090040c0 38 D0307 12:03:07.453857 678849 usertrap_amd64.go:225] [ 21717: 21717] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.453873 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.454464 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.456907 678849 usertrap_amd64.go:212] [ 21717: 21717] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.457004 678849 usertrap_amd64.go:122] [ 21717: 21717] Allocate a new trap: 0xc0090040c0 39 D0307 12:03:07.457088 678849 usertrap_amd64.go:225] [ 21717: 21717] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.458332 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.458711 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.459108 678849 usertrap_amd64.go:212] [ 21718: 21718] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.459217 678849 usertrap_amd64.go:122] [ 21718: 21718] Allocate a new trap: 0xc009d9a5d0 38 D0307 12:03:07.459661 678849 usertrap_amd64.go:225] [ 21718: 21718] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.461677 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.461893 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.462134 678849 usertrap_amd64.go:212] [ 21718: 21718] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.462192 678849 usertrap_amd64.go:122] [ 21718: 21718] Allocate a new trap: 0xc009d9a5d0 39 D0307 12:03:07.462257 678849 usertrap_amd64.go:225] [ 21718: 21718] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.463955 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.464208 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.478877 678849 usertrap_amd64.go:212] [ 21719: 21719] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.478952 678849 usertrap_amd64.go:122] [ 21719: 21719] Allocate a new trap: 0xc001430480 38 D0307 12:03:07.479414 678849 usertrap_amd64.go:225] [ 21719: 21719] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.481626 678849 usertrap_amd64.go:212] [ 21719: 21719] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.481686 678849 usertrap_amd64.go:122] [ 21719: 21719] Allocate a new trap: 0xc001430480 39 D0307 12:03:07.481752 678849 usertrap_amd64.go:225] [ 21719: 21719] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.483645 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.483973 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.496996 678849 usertrap_amd64.go:212] [ 21717: 21717] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.497089 678849 usertrap_amd64.go:122] [ 21717: 21717] Allocate a new trap: 0xc0090040c0 40 D0307 12:03:07.497146 678849 usertrap_amd64.go:225] [ 21717: 21717] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.501887 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.502268 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.504448 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.504706 678849 usertrap_amd64.go:212] [ 21719: 21719] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.504777 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.504794 678849 usertrap_amd64.go:122] [ 21719: 21719] Allocate a new trap: 0xc001430480 40 D0307 12:03:07.504870 678849 usertrap_amd64.go:225] [ 21719: 21719] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.510751 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.510992 678849 task_exit.go:204] [ 21717: 21717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.511010 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.511210 678849 task_signals.go:204] [ 21717: 21722] Signal 21717, PID: 21722, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.511334 678849 task_exit.go:204] [ 21717: 21717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.511488 678849 task_exit.go:204] [ 21717: 21722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.512463 678849 task_exit.go:204] [ 21719: 21719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.512694 678849 task_signals.go:204] [ 21719: 21725] Signal 21719, PID: 21725, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.512696 678849 task_exit.go:204] [ 21719: 21719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.512912 678849 task_exit.go:204] [ 21719: 21725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.513756 678849 task_exit.go:204] [ 21717: 21722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.513841 678849 task_exit.go:204] [ 21717: 21722] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.513933 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.514944 678849 task_exit.go:204] [ 21719: 21725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.515017 678849 task_exit.go:204] [ 21719: 21725] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.515134 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.515596 678849 task_exit.go:204] [ 21719: 21719] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.517045 678849 task_exit.go:204] [ 21717: 21717] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.low\x00', 0x2, 0x0) D0307 12:03:07.518869 678849 usertrap_amd64.go:212] [ 21716: 21716] Found the pattern at ip 55f99a050fa4:sysno 3 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, 0x0) D0307 12:03:07.519053 678849 usertrap_amd64.go:122] [ 21716: 21716] Allocate a new trap: 0xc001430420 40 D0307 12:03:07.519148 678849 usertrap_amd64.go:225] [ 21716: 21716] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.518981 678849 usertrap_amd64.go:212] [ 21718: 21718] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:07.519481 678849 usertrap_amd64.go:122] [ 21718: 21718] Allocate a new trap: 0xc009d9a5d0 40 D0307 12:03:07.519560 678849 usertrap_amd64.go:225] [ 21718: 21718] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.528301 678849 task_exit.go:204] [ 21716: 21716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.528575 678849 task_signals.go:204] [ 21716: 21721] Signal 21716, PID: 21721, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.528651 678849 task_signals.go:204] [ 21716: 21726] Signal 21716, PID: 21726, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.528771 678849 task_exit.go:204] [ 21716: 21726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.528885 678849 task_exit.go:204] [ 21716: 21716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.529070 678849 task_exit.go:204] [ 21716: 21721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.529181 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.529365 678849 task_exit.go:204] [ 21716: 21726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.529434 678849 task_exit.go:204] [ 21716: 21726] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.529509 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.530530 678849 usertrap_amd64.go:212] [ 21718: 21718] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.530623 678849 usertrap_amd64.go:122] [ 21718: 21718] Allocate a new trap: 0xc009d9a5d0 41 D0307 12:03:07.530701 678849 usertrap_amd64.go:225] [ 21718: 21718] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:07.531190 678849 task_exit.go:204] [ 21716: 21721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.531259 678849 task_exit.go:204] [ 21716: 21721] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.531341 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.531472 678849 task_exit.go:204] [ 21716: 21716] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.532867 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.533159 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:07 executing program 3: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xfffffd79) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) D0307 12:03:07.534342 678849 task_exit.go:204] [ 21718: 21718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.534490 678849 task_signals.go:204] [ 21718: 21723] Signal 21718, PID: 21723, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.534566 678849 task_signals.go:204] [ 21718: 21720] Signal 21718, PID: 21720, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.534613 678849 task_exit.go:204] [ 21718: 21723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.534699 678849 task_exit.go:204] [ 21718: 21718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.534851 678849 task_signals.go:204] [ 21718: 21727] Signal 21718, PID: 21727, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.534873 678849 task_exit.go:204] [ 21718: 21720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.535216 678849 task_signals.go:204] [ 21718: 21724] Signal 21718, PID: 21724, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.535395 678849 task_exit.go:204] [ 21718: 21720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.535475 678849 task_exit.go:204] [ 21718: 21720] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.535688 678849 task_exit.go:204] [ 21718: 21724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.535869 678849 task_exit.go:204] [ 21718: 21727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.536647 678849 task_exit.go:204] [ 21718: 21723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.536726 678849 task_exit.go:204] [ 21718: 21723] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.536888 678849 task_exit.go:204] [ 21718: 21724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.537002 678849 task_exit.go:204] [ 21718: 21724] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.538035 678849 task_exit.go:204] [ 21718: 21727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.538100 678849 task_exit.go:204] [ 21718: 21727] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.538181 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.538386 678849 task_exit.go:204] [ 21718: 21718] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/137) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @timestamp, @sack_perm, @mss={0x2, 0x2}, @mss={0x2, 0x1f}, @mss={0x2, 0x80000001}, @mss={0x2, 0xaf}], 0x7) D0307 12:03:07.544262 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.549818 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.550002 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.550501 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.563441 678849 usertrap_amd64.go:212] [ 21728: 21728] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.563575 678849 usertrap_amd64.go:122] [ 21728: 21728] Allocate a new trap: 0xc0098e05d0 38 D0307 12:03:07.563934 678849 usertrap_amd64.go:225] [ 21728: 21728] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.564051 678849 usertrap_amd64.go:212] [ 21729: 21729] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.564305 678849 usertrap_amd64.go:122] [ 21729: 21729] Allocate a new trap: 0xc009d9a960 38 D0307 12:03:07.566595 678849 usertrap_amd64.go:225] [ 21729: 21729] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.568183 678849 usertrap_amd64.go:212] [ 21728: 21728] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.568275 678849 usertrap_amd64.go:122] [ 21728: 21728] Allocate a new trap: 0xc0098e05d0 39 D0307 12:03:07.568351 678849 usertrap_amd64.go:225] [ 21728: 21728] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.568662 678849 usertrap_amd64.go:212] [ 21729: 21729] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.568791 678849 usertrap_amd64.go:122] [ 21729: 21729] Allocate a new trap: 0xc009d9a960 39 D0307 12:03:07.569022 678849 usertrap_amd64.go:225] [ 21729: 21729] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.571208 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.571716 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.572347 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.572638 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.577781 678849 usertrap_amd64.go:212] [ 21731: 21731] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.577863 678849 usertrap_amd64.go:122] [ 21731: 21731] Allocate a new trap: 0xc0098d6900 38 D0307 12:03:07.578377 678849 usertrap_amd64.go:225] [ 21731: 21731] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.580675 678849 usertrap_amd64.go:212] [ 21731: 21731] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.580780 678849 usertrap_amd64.go:122] [ 21731: 21731] Allocate a new trap: 0xc0098d6900 39 D0307 12:03:07.580884 678849 usertrap_amd64.go:225] [ 21731: 21731] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.589508 678849 usertrap_amd64.go:212] [ 21730: 21730] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.589617 678849 usertrap_amd64.go:122] [ 21730: 21730] Allocate a new trap: 0xc0098e0600 38 D0307 12:03:07.590140 678849 usertrap_amd64.go:225] [ 21730: 21730] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.590953 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.592391 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.598040 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.598342 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.600003 678849 usertrap_amd64.go:212] [ 21730: 21730] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.600117 678849 usertrap_amd64.go:122] [ 21730: 21730] Allocate a new trap: 0xc0098e0600 39 D0307 12:03:07.600209 678849 usertrap_amd64.go:225] [ 21730: 21730] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.600543 678849 usertrap_amd64.go:212] [ 21729: 21729] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.600601 678849 usertrap_amd64.go:122] [ 21729: 21729] Allocate a new trap: 0xc009d9a960 40 D0307 12:03:07.600705 678849 usertrap_amd64.go:225] [ 21729: 21729] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.601690 678849 usertrap_amd64.go:212] [ 21728: 21728] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.601773 678849 usertrap_amd64.go:122] [ 21728: 21728] Allocate a new trap: 0xc0098e05d0 40 D0307 12:03:07.601902 678849 usertrap_amd64.go:225] [ 21728: 21728] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.605022 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.605422 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.605764 678849 task_exit.go:204] [ 21728: 21728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.606072 678849 task_exit.go:204] [ 21728: 21728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.606071 678849 task_signals.go:204] [ 21728: 21733] Signal 21728, PID: 21733, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.606267 678849 task_exit.go:204] [ 21728: 21733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.608313 678849 task_exit.go:204] [ 21728: 21733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.608416 678849 task_exit.go:204] [ 21728: 21733] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.608498 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.608738 678849 task_exit.go:204] [ 21728: 21728] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.609583 678849 task_exit.go:204] [ 21729: 21729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.610018 678849 task_exit.go:204] [ 21729: 21729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.610507 678849 task_signals.go:204] [ 21729: 21732] Signal 21729, PID: 21732, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.610744 678849 task_exit.go:204] [ 21729: 21732] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, 0x0) D0307 12:03:07.613354 678849 task_exit.go:204] [ 21729: 21732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.613464 678849 task_exit.go:204] [ 21729: 21732] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.613637 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.614325 678849 task_exit.go:204] [ 21729: 21729] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.615471 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) D0307 12:03:07.616874 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.619771 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.620177 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.622886 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.623366 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.637205 678849 usertrap_amd64.go:212] [ 21731: 21731] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.637302 678849 usertrap_amd64.go:122] [ 21731: 21731] Allocate a new trap: 0xc0098d6900 40 D0307 12:03:07.637364 678849 usertrap_amd64.go:225] [ 21731: 21731] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.639265 678849 usertrap_amd64.go:212] [ 21730: 21730] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.639511 678849 usertrap_amd64.go:122] [ 21730: 21730] Allocate a new trap: 0xc0098e0600 40 D0307 12:03:07.639645 678849 usertrap_amd64.go:225] [ 21730: 21730] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.641097 678849 task_exit.go:204] [ 21731: 21731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.641226 678849 task_signals.go:204] [ 21731: 21735] Signal 21731, PID: 21735, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.641334 678849 task_exit.go:204] [ 21731: 21735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.641530 678849 task_signals.go:204] [ 21731: 21734] Signal 21731, PID: 21734, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.641557 678849 task_exit.go:204] [ 21731: 21731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.641716 678849 task_exit.go:204] [ 21731: 21735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.641774 678849 task_exit.go:204] [ 21731: 21735] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.642151 678849 task_exit.go:204] [ 21731: 21734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.642760 678849 task_exit.go:204] [ 21730: 21730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.643106 678849 task_signals.go:204] [ 21730: 21736] Signal 21730, PID: 21736, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.643201 678849 task_exit.go:204] [ 21730: 21736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.643337 678849 task_exit.go:204] [ 21730: 21730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.643990 678849 task_exit.go:204] [ 21731: 21734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.644131 678849 task_exit.go:204] [ 21731: 21734] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.644258 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.644898 678849 task_exit.go:204] [ 21731: 21731] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.645322 678849 task_exit.go:204] [ 21730: 21736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.645397 678849 task_exit.go:204] [ 21730: 21736] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.645502 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.645584 678849 task_exit.go:204] [ 21730: 21730] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x40) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) tee(r2, r1, 0x5, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {r4, r5/1000+60000}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 12:03:07 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/137) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @timestamp, @sack_perm, @mss={0x2, 0x2}, @mss={0x2, 0x1f}, @mss={0x2, 0x80000001}, @mss={0x2, 0xaf}], 0x7) D0307 12:03:07.654532 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.655956 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.660359 678849 usertrap_amd64.go:212] [ 21737: 21737] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.660493 678849 usertrap_amd64.go:122] [ 21737: 21737] Allocate a new trap: 0xc000a0ea20 38 D0307 12:03:07.660876 678849 usertrap_amd64.go:225] [ 21737: 21737] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.661307 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.661787 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.662967 678849 usertrap_amd64.go:212] [ 21737: 21737] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.663037 678849 usertrap_amd64.go:122] [ 21737: 21737] Allocate a new trap: 0xc000a0ea20 39 D0307 12:03:07.663109 678849 usertrap_amd64.go:225] [ 21737: 21737] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.663890 678849 usertrap_amd64.go:212] [ 21738: 21738] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.663994 678849 usertrap_amd64.go:122] [ 21738: 21738] Allocate a new trap: 0xc0014c6a50 38 D0307 12:03:07.664370 678849 usertrap_amd64.go:225] [ 21738: 21738] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.664833 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.665160 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.666624 678849 usertrap_amd64.go:212] [ 21738: 21738] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.666737 678849 usertrap_amd64.go:122] [ 21738: 21738] Allocate a new trap: 0xc0014c6a50 39 D0307 12:03:07.666836 678849 usertrap_amd64.go:225] [ 21738: 21738] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.669269 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.669514 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.680829 678849 usertrap_amd64.go:212] [ 21740: 21740] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.680976 678849 usertrap_amd64.go:122] [ 21740: 21740] Allocate a new trap: 0xc00046a930 38 D0307 12:03:07.681352 678849 usertrap_amd64.go:225] [ 21740: 21740] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.682999 678849 usertrap_amd64.go:212] [ 21740: 21740] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.683077 678849 usertrap_amd64.go:122] [ 21740: 21740] Allocate a new trap: 0xc00046a930 39 D0307 12:03:07.683190 678849 usertrap_amd64.go:225] [ 21740: 21740] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.685141 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.685535 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.687471 678849 usertrap_amd64.go:212] [ 21738: 21738] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.687556 678849 usertrap_amd64.go:122] [ 21738: 21738] Allocate a new trap: 0xc0014c6a50 40 D0307 12:03:07.687640 678849 usertrap_amd64.go:225] [ 21738: 21738] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.689603 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.689937 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.691199 678849 usertrap_amd64.go:212] [ 21737: 21737] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.691261 678849 usertrap_amd64.go:122] [ 21737: 21737] Allocate a new trap: 0xc000a0ea20 40 D0307 12:03:07.691347 678849 usertrap_amd64.go:225] [ 21737: 21737] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.692177 678849 task_exit.go:204] [ 21738: 21738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.692532 678849 task_signals.go:204] [ 21738: 21741] Signal 21738, PID: 21741, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.692677 678849 task_exit.go:204] [ 21738: 21741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.693003 678849 task_exit.go:204] [ 21738: 21741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.693052 678849 task_exit.go:204] [ 21738: 21741] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.694321 678849 usertrap_amd64.go:212] [ 21739: 21739] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.694417 678849 usertrap_amd64.go:122] [ 21739: 21739] Allocate a new trap: 0xc0090044e0 38 D0307 12:03:07.694954 678849 task_exit.go:204] [ 21738: 21738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.695077 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.695561 678849 task_exit.go:204] [ 21738: 21738] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, &(0x7f0000000180)={0x0, 0x21}, 0x0) D0307 12:03:07.697729 678849 usertrap_amd64.go:225] [ 21739: 21739] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.699474 678849 task_exit.go:204] [ 21737: 21737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.699695 678849 task_exit.go:204] [ 21737: 21737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.699870 678849 task_signals.go:204] [ 21737: 21742] Signal 21737, PID: 21742, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.699951 678849 task_exit.go:204] [ 21737: 21742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.701818 678849 task_exit.go:204] [ 21737: 21742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.701899 678849 task_exit.go:204] [ 21737: 21742] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.701978 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.702577 678849 task_exit.go:204] [ 21737: 21737] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.702684 678849 usertrap_amd64.go:212] [ 21739: 21739] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.702759 678849 usertrap_amd64.go:122] [ 21739: 21739] Allocate a new trap: 0xc0090044e0 39 D0307 12:03:07.702814 678849 usertrap_amd64.go:225] [ 21739: 21739] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) inotify_rm_watch(r0, r1) D0307 12:03:07.706072 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.706418 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.708678 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.709085 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.709833 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.710696 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.727516 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.729576 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.730762 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.731059 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.731991 678849 usertrap_amd64.go:212] [ 21740: 21740] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:07.732047 678849 usertrap_amd64.go:122] [ 21740: 21740] Allocate a new trap: 0xc00046a930 40 D0307 12:03:07.732109 678849 usertrap_amd64.go:225] [ 21740: 21740] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.736130 678849 usertrap_amd64.go:212] [ 21739: 21739] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.736210 678849 usertrap_amd64.go:122] [ 21739: 21739] Allocate a new trap: 0xc0090044e0 40 D0307 12:03:07.736276 678849 usertrap_amd64.go:225] [ 21739: 21739] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.738854 678849 task_exit.go:204] [ 21739: 21739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.739126 678849 task_exit.go:204] [ 21739: 21739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.739125 678849 task_signals.go:204] [ 21739: 21746] Signal 21739, PID: 21746, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.739263 678849 task_exit.go:204] [ 21739: 21746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.741173 678849 task_exit.go:204] [ 21739: 21746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.741244 678849 task_exit.go:204] [ 21739: 21746] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.741328 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.744623 678849 task_exit.go:204] [ 21739: 21739] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.744837 678849 usertrap_amd64.go:212] [ 21743: 21743] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.745017 678849 usertrap_amd64.go:122] [ 21743: 21743] Allocate a new trap: 0xc00046a9f0 38 D0307 12:03:07.745556 678849 usertrap_amd64.go:225] [ 21743: 21743] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.747224 678849 usertrap_amd64.go:212] [ 21740: 21740] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.747303 678849 usertrap_amd64.go:122] [ 21740: 21740] Allocate a new trap: 0xc00046a930 41 D0307 12:03:07.747433 678849 usertrap_amd64.go:225] [ 21740: 21740] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) 12:03:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x40) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) tee(r2, r1, 0x5, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {r4, r5/1000+60000}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x40) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup(r3, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) (async) tee(r2, r1, 0x5, 0x2) (async) clock_gettime(0x0, &(0x7f00000000c0)) (async) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {r4, r5/1000+60000}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) D0307 12:03:07.751120 678849 task_exit.go:204] [ 21740: 21740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.751398 678849 task_signals.go:204] [ 21740: 21745] Signal 21740, PID: 21745, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.751451 678849 task_exit.go:204] [ 21740: 21740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.751613 678849 task_signals.go:204] [ 21740: 21747] Signal 21740, PID: 21747, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.751693 678849 task_exit.go:204] [ 21740: 21745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.751878 678849 task_exit.go:204] [ 21740: 21747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.752116 678849 task_exit.go:204] [ 21740: 21745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.752251 678849 task_exit.go:204] [ 21740: 21745] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.753243 678849 usertrap_amd64.go:212] [ 21743: 21743] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.753329 678849 usertrap_amd64.go:122] [ 21743: 21743] Allocate a new trap: 0xc00046a9f0 39 D0307 12:03:07.753407 678849 usertrap_amd64.go:225] [ 21743: 21743] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.754311 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.754329 678849 task_exit.go:204] [ 21740: 21747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.754443 678849 task_exit.go:204] [ 21740: 21747] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.754572 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.754691 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.755333 678849 task_exit.go:204] [ 21740: 21740] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/137) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @timestamp, @sack_perm, @mss={0x2, 0x2}, @mss={0x2, 0x1f}, @mss={0x2, 0x80000001}, @mss={0x2, 0xaf}], 0x7) (rerun: 32) D0307 12:03:07.757703 678849 usertrap_amd64.go:212] [ 21744: 21744] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.757802 678849 usertrap_amd64.go:122] [ 21744: 21744] Allocate a new trap: 0xc0098d6c00 38 D0307 12:03:07.758273 678849 usertrap_amd64.go:225] [ 21744: 21744] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.758601 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.759403 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.760582 678849 usertrap_amd64.go:212] [ 21744: 21744] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.760716 678849 usertrap_amd64.go:122] [ 21744: 21744] Allocate a new trap: 0xc0098d6c00 39 D0307 12:03:07.760820 678849 usertrap_amd64.go:225] [ 21744: 21744] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.763393 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.763644 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.763846 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.764176 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.784472 678849 usertrap_amd64.go:212] [ 21743: 21743] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.784569 678849 usertrap_amd64.go:122] [ 21743: 21743] Allocate a new trap: 0xc00046a9f0 40 D0307 12:03:07.784639 678849 usertrap_amd64.go:225] [ 21743: 21743] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.786603 678849 task_exit.go:204] [ 21743: 21743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.786858 678849 task_signals.go:204] [ 21743: 21749] Signal 21743, PID: 21749, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.786945 678849 task_exit.go:204] [ 21743: 21743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.788094 678849 task_exit.go:204] [ 21743: 21749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.790050 678849 task_exit.go:204] [ 21743: 21749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.790129 678849 task_exit.go:204] [ 21743: 21749] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.790232 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.792272 678849 task_exit.go:204] [ 21743: 21743] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.793365 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.793871 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.795932 678849 usertrap_amd64.go:212] [ 21744: 21744] Found the pattern at ip 55b880b0cfa4:sysno 3 12:03:07 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:07.795982 678849 usertrap_amd64.go:122] [ 21744: 21744] Allocate a new trap: 0xc0098d6c00 40 D0307 12:03:07.796072 678849 usertrap_amd64.go:225] [ 21744: 21744] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.799435 678849 usertrap_amd64.go:212] [ 21748: 21748] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.799543 678849 usertrap_amd64.go:122] [ 21748: 21748] Allocate a new trap: 0xc0014306c0 38 D0307 12:03:07.799557 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.799916 678849 task_exit.go:204] [ 21744: 21744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.799985 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.799917 678849 usertrap_amd64.go:225] [ 21748: 21748] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.800117 678849 task_signals.go:204] [ 21744: 21750] Signal 21744, PID: 21750, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.800321 678849 task_exit.go:204] [ 21744: 21750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.800637 678849 task_exit.go:204] [ 21744: 21744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.802365 678849 task_exit.go:204] [ 21744: 21750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.802490 678849 task_exit.go:204] [ 21744: 21750] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.802646 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.803089 678849 task_exit.go:204] [ 21744: 21744] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5000601) pipe2$9p(&(0x7f0000000100), 0x80800) D0307 12:03:07.806904 678849 usertrap_amd64.go:212] [ 21748: 21748] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.806998 678849 usertrap_amd64.go:122] [ 21748: 21748] Allocate a new trap: 0xc0014306c0 39 D0307 12:03:07.807117 678849 usertrap_amd64.go:225] [ 21748: 21748] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.810348 678849 usertrap_amd64.go:212] [ 21751: 21751] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.810469 678849 usertrap_amd64.go:122] [ 21751: 21751] Allocate a new trap: 0xc0098e0810 38 D0307 12:03:07.810993 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.811053 678849 usertrap_amd64.go:225] [ 21751: 21751] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.811324 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.813808 678849 usertrap_amd64.go:212] [ 21751: 21751] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.813872 678849 usertrap_amd64.go:122] [ 21751: 21751] Allocate a new trap: 0xc0098e0810 39 D0307 12:03:07.813960 678849 usertrap_amd64.go:225] [ 21751: 21751] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.823322 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.823667 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.825181 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.825468 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.843677 678849 usertrap_amd64.go:212] [ 21753: 21753] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.843786 678849 usertrap_amd64.go:122] [ 21753: 21753] Allocate a new trap: 0xc008046bd0 38 D0307 12:03:07.844454 678849 usertrap_amd64.go:225] [ 21753: 21753] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.849158 678849 usertrap_amd64.go:212] [ 21751: 21751] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:07.849226 678849 usertrap_amd64.go:122] [ 21751: 21751] Allocate a new trap: 0xc0098e0810 40 D0307 12:03:07.849313 678849 usertrap_amd64.go:225] [ 21751: 21751] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:07.849314 678849 usertrap_amd64.go:212] [ 21752: 21752] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:07.849438 678849 usertrap_amd64.go:122] [ 21752: 21752] Allocate a new trap: 0xc0098e08a0 38 D0307 12:03:07.849931 678849 usertrap_amd64.go:225] [ 21752: 21752] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:07.850429 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.850461 678849 usertrap_amd64.go:212] [ 21753: 21753] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.850631 678849 usertrap_amd64.go:122] [ 21753: 21753] Allocate a new trap: 0xc008046bd0 39 D0307 12:03:07.850743 678849 usertrap_amd64.go:225] [ 21753: 21753] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.850797 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.853111 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.853456 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.853767 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.854166 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.856707 678849 usertrap_amd64.go:212] [ 21751: 21751] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:07.856797 678849 usertrap_amd64.go:122] [ 21751: 21751] Allocate a new trap: 0xc0098e0810 41 D0307 12:03:07.856910 678849 usertrap_amd64.go:225] [ 21751: 21751] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:07.857648 678849 usertrap_amd64.go:212] [ 21752: 21752] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:07.857738 678849 usertrap_amd64.go:122] [ 21752: 21752] Allocate a new trap: 0xc0098e08a0 39 D0307 12:03:07.857828 678849 usertrap_amd64.go:225] [ 21752: 21752] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:07.858706 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.859393 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.859556 678849 task_exit.go:204] [ 21751: 21751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.859849 678849 task_exit.go:204] [ 21751: 21751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.859977 678849 task_signals.go:204] [ 21751: 21754] Signal 21751, PID: 21754, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.860103 678849 task_exit.go:204] [ 21751: 21754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.860318 678849 task_exit.go:204] [ 21751: 21754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.860373 678849 task_exit.go:204] [ 21751: 21754] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.860519 678849 task_signals.go:204] [ 21751: 21756] Signal 21751, PID: 21756, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.860598 678849 task_exit.go:204] [ 21751: 21756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.862953 678849 task_exit.go:204] [ 21751: 21756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.863057 678849 task_exit.go:204] [ 21751: 21756] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.863159 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:07.863292 678849 task_exit.go:204] [ 21751: 21751] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) D0307 12:03:07.868450 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.869200 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.878019 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.878878 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.883618 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.884387 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.893699 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.893988 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.895066 678849 usertrap_amd64.go:212] [ 21753: 21753] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:07.895149 678849 usertrap_amd64.go:122] [ 21753: 21753] Allocate a new trap: 0xc008046bd0 40 D0307 12:03:07.895226 678849 usertrap_amd64.go:225] [ 21753: 21753] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:07.902755 678849 task_exit.go:204] [ 21753: 21753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.902994 678849 task_exit.go:204] [ 21753: 21753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.903520 678849 task_signals.go:204] [ 21753: 21759] Signal 21753, PID: 21759, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.903661 678849 task_exit.go:204] [ 21753: 21759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.910789 678849 task_exit.go:204] [ 21753: 21759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.910869 678849 task_exit.go:204] [ 21753: 21759] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.910980 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:07.911193 678849 usertrap_amd64.go:212] [ 21748: 21748] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:07.911320 678849 usertrap_amd64.go:122] [ 21748: 21748] Allocate a new trap: 0xc0014306c0 40 D0307 12:03:07.911452 678849 usertrap_amd64.go:225] [ 21748: 21748] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:07.913030 678849 task_exit.go:204] [ 21753: 21753] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) pipe2$9p(&(0x7f0000000100), 0x80800) D0307 12:03:07.920791 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.921391 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.925023 678849 usertrap_amd64.go:212] [ 21752: 21752] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:07.925110 678849 usertrap_amd64.go:122] [ 21752: 21752] Allocate a new trap: 0xc0098e08a0 40 D0307 12:03:07.925234 678849 usertrap_amd64.go:225] [ 21752: 21752] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:07.930110 678849 task_exit.go:204] [ 21752: 21752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.930295 678849 task_signals.go:204] [ 21752: 21763] Signal 21752, PID: 21763, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.930448 678849 task_exit.go:204] [ 21752: 21763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.930709 678849 task_exit.go:204] [ 21752: 21752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.931824 678849 usertrap_amd64.go:212] [ 21748: 21748] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:07.931907 678849 usertrap_amd64.go:122] [ 21748: 21748] Allocate a new trap: 0xc0014306c0 41 D0307 12:03:07.932007 678849 usertrap_amd64.go:225] [ 21748: 21748] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:07.933096 678849 task_exit.go:204] [ 21752: 21763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.933189 678849 task_exit.go:204] [ 21752: 21763] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.933299 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:07.933430 678849 task_exit.go:204] [ 21752: 21752] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.935191 678849 task_exit.go:204] [ 21748: 21748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.935344 678849 task_signals.go:204] [ 21748: 21757] Signal 21748, PID: 21757, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.935354 678849 task_signals.go:204] [ 21748: 21761] Signal 21748, PID: 21761, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.935450 678849 task_exit.go:204] [ 21748: 21757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.935693 678849 task_exit.go:204] [ 21748: 21757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.935732 678849 task_exit.go:204] [ 21748: 21757] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.935904 678849 task_signals.go:204] [ 21748: 21755] Signal 21748, PID: 21755, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.935976 678849 task_signals.go:204] [ 21748: 21758] Signal 21748, PID: 21758, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.936084 678849 task_signals.go:204] [ 21748: 21760] Signal 21748, PID: 21760, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:07.936207 678849 task_exit.go:204] [ 21748: 21758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.936376 678849 task_exit.go:204] [ 21748: 21758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.936431 678849 task_exit.go:204] [ 21748: 21758] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.936600 678849 task_exit.go:204] [ 21748: 21748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.936715 678849 task_exit.go:204] [ 21748: 21755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.936813 678849 task_exit.go:204] [ 21748: 21761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.937287 678849 task_exit.go:204] [ 21748: 21760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:07.937620 678849 task_exit.go:204] [ 21748: 21760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.937675 678849 task_exit.go:204] [ 21748: 21760] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.937918 678849 task_exit.go:204] [ 21748: 21755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.937968 678849 task_exit.go:204] [ 21748: 21755] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:07.941263 678849 task_exit.go:204] [ 21748: 21761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:07.941540 678849 task_exit.go:204] [ 21748: 21761] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:07.941714 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:07.941946 678849 task_exit.go:204] [ 21748: 21748] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x40) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) (async) tee(r2, r1, 0x5, 0x2) (async, rerun: 64) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) (rerun: 64) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {r4, r5/1000+60000}}) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (rerun: 32) D0307 12:03:07.947065 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.949108 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.953136 678849 usertrap_amd64.go:212] [ 21762: 21762] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:07.953222 678849 usertrap_amd64.go:122] [ 21762: 21762] Allocate a new trap: 0xc009004810 38 D0307 12:03:07.953312 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:07.953620 678849 usertrap_amd64.go:225] [ 21762: 21762] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:07.953886 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.956055 678849 usertrap_amd64.go:212] [ 21764: 21764] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:07.956644 678849 usertrap_amd64.go:212] [ 21762: 21762] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:07.957338 678849 usertrap_amd64.go:122] [ 21764: 21764] Allocate a new trap: 0xc008046cc0 38 D0307 12:03:07.957342 678849 usertrap_amd64.go:122] [ 21762: 21762] Allocate a new trap: 0xc009004810 39 D0307 12:03:07.957649 678849 usertrap_amd64.go:225] [ 21762: 21762] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:07.957767 678849 usertrap_amd64.go:225] [ 21764: 21764] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:07.960093 678849 usertrap_amd64.go:212] [ 21764: 21764] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:07.960164 678849 usertrap_amd64.go:122] [ 21764: 21764] Allocate a new trap: 0xc008046cc0 39 D0307 12:03:07.960240 678849 usertrap_amd64.go:225] [ 21764: 21764] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:07.962697 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.963042 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.965553 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.967245 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.990855 678849 usertrap_amd64.go:212] [ 21766: 21766] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:07.990950 678849 usertrap_amd64.go:122] [ 21766: 21766] Allocate a new trap: 0xc008f96ed0 38 D0307 12:03:07.991219 678849 usertrap_amd64.go:225] [ 21766: 21766] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:07.994573 678849 usertrap_amd64.go:212] [ 21766: 21766] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:07.994748 678849 usertrap_amd64.go:122] [ 21766: 21766] Allocate a new trap: 0xc008f96ed0 39 D0307 12:03:07.994896 678849 usertrap_amd64.go:225] [ 21766: 21766] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:07.998245 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:07.998614 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:07.999996 678849 usertrap_amd64.go:212] [ 21765: 21765] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:08.000123 678849 usertrap_amd64.go:122] [ 21765: 21765] Allocate a new trap: 0xc0098e0930 38 D0307 12:03:08.004507 678849 usertrap_amd64.go:225] [ 21765: 21765] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:08.006934 678849 usertrap_amd64.go:212] [ 21765: 21765] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:08.007006 678849 usertrap_amd64.go:122] [ 21765: 21765] Allocate a new trap: 0xc0098e0930 39 D0307 12:03:08.007171 678849 usertrap_amd64.go:225] [ 21765: 21765] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:08.009060 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.009504 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.012588 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.013045 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.016985 678849 usertrap_amd64.go:212] [ 21762: 21762] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:08.017114 678849 usertrap_amd64.go:122] [ 21762: 21762] Allocate a new trap: 0xc009004810 40 D0307 12:03:08.017206 678849 usertrap_amd64.go:225] [ 21762: 21762] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:08.017892 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.018192 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.018966 678849 usertrap_amd64.go:212] [ 21764: 21764] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:08.019030 678849 usertrap_amd64.go:122] [ 21764: 21764] Allocate a new trap: 0xc008046cc0 40 D0307 12:03:08.019101 678849 usertrap_amd64.go:225] [ 21764: 21764] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:08.022025 678849 task_exit.go:204] [ 21762: 21762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.022270 678849 task_signals.go:204] [ 21762: 21767] Signal 21762, PID: 21767, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.022351 678849 task_exit.go:204] [ 21762: 21762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.022502 678849 task_exit.go:204] [ 21762: 21767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.023163 678849 task_exit.go:204] [ 21764: 21764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.023406 678849 task_exit.go:204] [ 21764: 21764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.024273 678849 task_exit.go:204] [ 21762: 21767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.024332 678849 task_exit.go:204] [ 21762: 21767] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.024408 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:08.025046 678849 task_exit.go:204] [ 21762: 21762] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.026529 678849 task_signals.go:204] [ 21764: 21768] Signal 21764, PID: 21768, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.026610 678849 task_exit.go:204] [ 21764: 21768] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) (async) D0307 12:03:08.029264 678849 task_exit.go:204] [ 21764: 21768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.029390 678849 task_exit.go:204] [ 21764: 21768] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.029595 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:08.029826 678849 task_exit.go:204] [ 21764: 21764] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.037286 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.037640 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:08 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) semget(0x3, 0x1, 0xafe45a147f0f4904) pipe2$9p(&(0x7f0000000100), 0x80800) D0307 12:03:08.040178 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.040551 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.045917 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.046212 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.049862 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.050624 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.063566 678849 usertrap_amd64.go:212] [ 21765: 21765] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:08.063803 678849 usertrap_amd64.go:122] [ 21765: 21765] Allocate a new trap: 0xc0098e0930 40 D0307 12:03:08.063940 678849 usertrap_amd64.go:225] [ 21765: 21765] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:08.065948 678849 usertrap_amd64.go:212] [ 21766: 21766] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:08.066049 678849 usertrap_amd64.go:122] [ 21766: 21766] Allocate a new trap: 0xc008f96ed0 40 D0307 12:03:08.066121 678849 usertrap_amd64.go:225] [ 21766: 21766] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:08.067058 678849 task_exit.go:204] [ 21765: 21765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.067244 678849 task_exit.go:204] [ 21765: 21765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.067458 678849 task_signals.go:204] [ 21765: 21771] Signal 21765, PID: 21771, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.068060 678849 task_exit.go:204] [ 21765: 21771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.070274 678849 task_exit.go:204] [ 21765: 21771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.070737 678849 task_exit.go:204] [ 21765: 21771] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.071097 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:08.071615 678849 task_exit.go:204] [ 21765: 21765] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 2: timer_create(0x5, 0x0, &(0x7f00000001c0)) D0307 12:03:08.079501 678849 usertrap_amd64.go:212] [ 21773: 21773] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:08.079721 678849 usertrap_amd64.go:122] [ 21773: 21773] Allocate a new trap: 0xc009d9b230 38 D0307 12:03:08.080275 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.080468 678849 usertrap_amd64.go:225] [ 21773: 21773] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:08.080616 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.080839 678849 usertrap_amd64.go:212] [ 21766: 21766] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:08.080917 678849 usertrap_amd64.go:122] [ 21766: 21766] Allocate a new trap: 0xc008f96ed0 41 D0307 12:03:08.081031 678849 usertrap_amd64.go:225] [ 21766: 21766] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:08.083816 678849 usertrap_amd64.go:212] [ 21773: 21773] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:08.083906 678849 usertrap_amd64.go:122] [ 21773: 21773] Allocate a new trap: 0xc009d9b230 39 D0307 12:03:08.084032 678849 usertrap_amd64.go:225] [ 21773: 21773] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:08.084695 678849 task_exit.go:204] [ 21766: 21766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.084921 678849 task_signals.go:204] [ 21766: 21772] Signal 21766, PID: 21772, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.085106 678849 task_exit.go:204] [ 21766: 21772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.085279 678849 task_signals.go:204] [ 21766: 21769] Signal 21766, PID: 21769, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.085436 678849 task_exit.go:204] [ 21766: 21772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.085535 678849 task_exit.go:204] [ 21766: 21772] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.085430 678849 task_signals.go:204] [ 21766: 21770] Signal 21766, PID: 21770, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.085700 678849 task_exit.go:204] [ 21766: 21770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.085922 678849 task_exit.go:204] [ 21766: 21770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.085979 678849 task_exit.go:204] [ 21766: 21770] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.086070 678849 task_exit.go:204] [ 21766: 21769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.086289 678849 task_exit.go:204] [ 21766: 21769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.086372 678849 task_exit.go:204] [ 21766: 21769] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.088681 678849 task_exit.go:204] [ 21766: 21766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.088784 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:08.089344 678849 task_exit.go:204] [ 21766: 21766] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0xba, 0x40, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x26}, 0x7800, 0x80, 0x101, 0x7}}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x72, r1, &(0x7f0000000900)="d1bf946bf6764daed04b59bbc8da44df6efde6519b8eb0e02f46b6a1b0e696974f2f775e4f948581a8d49f24202ba9d9dadfbf95df72331058231b3515ee833d4da27e05f6cad675261ee31903a2117b6d2125f5df7b74df4180da5da299130f2905d3a1dcb22537d8bd24aa1244120f637d1105dc53642788126c299e5020e7c46b4d86806d1bcb91c0923e83df687eb17ea6d630a5ce1afa6326caa0d1114e1f06eb869386536d8d97281763b866c518d982334a062429e4352115e4a838b8f69a21a7b74ff52c6c6fd67a53b8096a8f21f620732d8128c9271793d4dd2832fc01829906731e514af50ff9a421536969f4f4772f79571c01ad5f4138aae4121cd7b9eb2e33474193352dbb7c8d38a99af9e49bed0c410c9f5aa02540ec512b787d85f8d2854758a40ac47ae594cd617a06499b4a77852bd2f82bc897844cb453498675832316552a70fab05ecd57b6a9a862afb46b8b5473b0aaf4cee69c772799ca9c6008f0a5e329fa2cd05f47f8353454b28852db79d1caf3ebfbeb73fa2a42470218aabdf8c253a1fd42511900bf69fcf00022447e27bc547e8683d6238e6c7a29be5997520dad70436f79c5551c87ec199cf8db5797c1a663ee137bdd497644ebbefce0354c5fe6fae0dde02c53c6d029d08c32cb3c30f9b1f5ad29fa8d877b09c2753ce565694944c6fe353c2cc376a935dceb8fbdbe57e74b824912f516d2eab9bc35ce617b0a294e680dd46292734a8c1c04f253ce414891db743c886197f37570f5f872b77e8ced4f672c52489e129d0b31a6d6258ac6b613e45362ce95853a6737a3e953d66c078c33f80f00d51f3ab615f82b5d322764d65929763d145925021a5c9fcc6b73cf12c60a740eea662b10e920ec99cbaa1266f69628ad92a3470dd4834d71ef1417a5c44ed9e9d726744bbb161bdd88b7ebc58e67a33d6ff2bbd6986b9c0bd5572097ff4344b36259a53338d9d2e70b12dd8389ee5af028c9ccc230b314bb6cb8a70022df5b5a7c203e22246847b889854a00c5a497a04d5196eb57c38bce6f7d905d2bda78345dabae918f36488c33ea16d84d544217490a3088497927e6d5ba9fb24761eb784a1cf1dde619048290efd18721046f843a2a9981497061294895009b46035d7f820a21f699bf208a4a536a1682632dd5e1a485bc5d7b9ce51f2ee7097d4e485746c5ff9283395148950e17eb9e50d0c8eb045282f8a82d5819aeb49d7ff4225ad80265660eb9b640f2ab60213e3e88f906bceb73698d2ab014b03fe0c7709d7248dd1bcd38a67b793a869863591797605f5a498aa1e587168ee784437c381005ed245e462b0b1c47ffa43dbd0e26dc0f4fc26296d91c03cc13db71247bbe23aea3b01ca73b027e07a768a31bfa4d21a25d95cafc1be7bce9b6ccd76301840e93904d74db6a7e7fe04cf5016780b947f35e1c0546e49de4b8d0a363db2d6adb2f31e6030bdfe03acd49c3ce1b9091d82f630819d2123379eb7d71cdb1b374ca3fad0ab6cb4d86a15bdb3e432995d48ad98844805ddbfe2969ce10529f52ae26a47f1681714c1a39f4cc6bb1301c73641a42ff823460e5b45b71e47624c001e24313772057744c776fa0aa8a28d90856b94e4e735b5f817035cde0fbc74d9186270ca3c71c193fb3b477cac423332a3f32f78344527021fa52e64213cc5c69176d809a115e83cc43b93df3bdde6cf275245f122678a2cad887baceb704c78335c7757bd34cb6c5b6ce77264167bba46bb551eabef02a89736d1bbe0d676ad436f9c8d1e0861236c545a0a29266cba4c27d864b240c47068a54376d8d01aac56da94c04503e1fb685efcbad26ecc9875a03f8fda833bef39ca786f1c4f0faebeb554fa12b3e3a5aeb0370c77192564b14179144f60e8fd95410d96c9c6e040e08e88537d61093248a5c54e5e99ff394c670afaf9ecaea73010faf6c1df89208ebaf3733dc684d6568454b436b97282f851d6dacf96ac8d676c005a045d12c3787d8c46f450c1b7f0bbb8837f67d2a7b6668cb915f2497b624d2e35ed441717c8285f8f615c78bc16a8f60fd2eb21c2d320371d21d0a07b0245d68f2913cd38f4c4e27c5793532590bca331aeff5424f7d3b8361ee3cd9e176ca7eb60609d85816b4936db7f796a602aef4b422677f01359654125c816b994d542c25e50e9edbaaafa1e4924f18634e89f8742a9c2887d5bd6caf9a2a5a228399ca3cd1a2abec36feb415a4e4353dfb440f290dbe3e1b8d48ea1a9e4625f743a1cf472b731764dfa5650620608d0eb9a106dbd31d284b0167058a7dbaad77dd5affb7c01609cfc4f757b2ba7eab25414bd37d88ad896a384eb75105ef9bc750e5b618f41f0cf36f3327247846f0693251fe48cadba5b710101d44cc210b44e9daccdad6482c5020e57e4c03ac3fd1aaf13d948ef0b4d696c4847a2a76ad401ddc74d722eeb3ff70457b922a91567f20c408f21b6b4529489b9c9a20d8b6a38ed8aa2fe13d86c97689df4b7d087c8d95ed9443d93a33178b0e37d8bf281890f8e8f008807fd1976fb5306570e04eaf528a48e9045200140009c2c85c351af0eb0858af79f21f5d4e4a383ffb50ef10f0fabf0ca48d4716a288e87305ce6da9aa17031c9177937415551acaa0b07dea3ce44462adf617d9e265f18a1267671762f00f93dc7ee396f54e6b55c99d713367a80826a48a9e64d3bcf400e6797248ccc73c976e829875bf88f0e38f404987cac0ac28ab4a6b210a01771d33071f457a0cbe9bb7cfe9ae9f9647f354604595a03dc0b57acaddf2c1cf951d17ee1f40e1595e5a8d20f99f86cef861e278dc1586691fe06f4b1e391cddf275fcf368cc3f25654dc347a2cc010d0ae2a73b58c25e170fa1ad0bb9ed31421b3f7015bea15f794b68844bb6b69c83044d9f4bea832059e51eba9cac039ae0884d6f7891720cbb7dd926d7e14d6227ce3bfd8f8f26ba1f2248a5bb429d98d2ab277cd53266da6fb1c6167ce55ecb36f5a06a9b7570589fcc26841078c80a6967774c0c49cb3f680929704bd1c189834a84da2bcbb5a15b6539300406b85362fd058023c0f5cc32e5d9c84f76d56288d299e41cb66e8cdcf04956ac9e26bea9a38e2ab4378d299a07d79bc3af4ac66f07977dc116d9e680e791b8e01bea15a521c5ae02d822f0a0f580cc8499a1ea18824f9cc314618cb4d6e608178b31ee3d1ffe517e3f2cfa3c8214ff7c3e8e6c43026abced5d9b1e3e6e302969feb3dc1e51d703b27f429d2bf1e6e9d95cd9d3b08f1febb0e769929c0eda5938224d7a21fd2fc44d8c075f9431080d6d9c1d481672b3dfc6f7b13714ad98446b002ae8ffc2ef14b4321dfe654e04852c85b827781e2930f862c8546fb28b004993706c020eb5c8832c6e5849a74ca655a7e77e3aced8589bbb9c5587520e7c705fd1cb4b4ca7baf41bb6bdf90ade2c506255038ca2f9567034b1f08c3e89660f65195d4bfbd76751c6618690f981c0e920b37cd974443fa79f74716dfdb5ceb39d92b0b8f91affe5d878c9f614c4109c76103981faea631f353fcbf8c7990a6be86d5edf1868c90e0be028c84c4469a18d4ab9de21ae3e9b060aeca6652d5e6a9d4890e3613572dc32d7a7ddd925ff12179e492412a537484820805de06bb0c7cc1da969cda70d0af1c8c2f1f79cfb52d8a81b7283e0a7a06212707f74a1532ca6b8fa3a8b6fa6479336d79d6271e0e7380237f3e1692a6d7691340e06fb0f3e19b6fb43b78f3fef99c141a0d737d6b60030f47150ae00b2064dc73e6761e9535841c807883e51e90dc858d26078e55dbec2f99a874936491ad6d5e042af9a6eedfb28aeb31ece88d60e20a15354064c6d314f53eb6573ddc21e0052b67d9239b22b1ce351c1508972dfdc7b976d01a0752615fa3cd345ca9a7ad42e3045c91654c97336877b0d23150271b0d28fe881414bf53078fd84807d98bd1912a2f007c74bf45c6d4b6376282fa5f47e00f10eb564b8987bdff788b519588f6e92061afd2d436aeac0a8106b38c176deadef4a69b7362cb9696a216c7d7d98d800b38684c7e63a70d45fe7cd5c4ef293741d91bb12fcfda5475d03e3b27545cd8bdade9a152089cae41baab014bc26f4f0d56c18ed678b62a23f26582c5e507a3170f9047a51f1a015fb8dba65e1f94675cf8570a1583bba6705489b45dd056ba5e4e688a6c1bb8a9cfd6866193c23e4c7db1f27157346d8e31730502a7dd32c539e9abdda345d08b3e8a04b1a67a89f5dd339213066ebbca95c0c25c8662e8913de6072407261a2f6c861805874de0d5c952c6c57561530ddeb41d4058eb03a399f4e9a9f97f008e04f4be10329b69bd28c11bb432569a0acf303ea9a9da2aa4db38ea0661cb2b27ac4cf017e0f6d547f2e7c2a36ae3e544de0dd4f3731880fe819d8b7c7964f94827876029445c9dd42a140d13da507e9af6f65f2b903b320f2dfbada4bf65d3318238fdb8b8f4e6bcc9ef17de33a322f022d63cb30729d91a5b8a28ac25634326fad30ef1a1e56ec768349a11fedd4d248b65d9f2ae4569a9aa1763d6bdce3aa60af987f72e23f764b8c1de8bf99a324b50a74fa9b27421ff406f5d622582ad517d3b1f292cb550b030a9ecab14b840b0966eeed1359cf0989b02c7be938ee2a0d926ad47e9bc7a76f719c236bdbfaabd83fe3375638b68ea7ca832794060933fe66c150f5a6e10540850d80e9f282567bbd1169e255e0332d0c3e3cd827762bf13565e2c7153410abed28b5b6615986f8455f4ad5ad3fb21e9682469e6d35b96271f5dfc1e70418f86a5a24adf80e4c1902f50fbfae586bcd4a698cc69a13524c26989498ae82b41200951e93e3713c2aa1d8a9341bfee171e69b1fc04e24f3d712999c8ca7504a81ef2159c0ee0f9e9d9019ad6cb3f7569ffd0710885a5da9313083baee1d78cbb82c5c883a68822a0864924bf5b8afcb512a263209486487405fba88b6c11c33f5601fe33daebacc153e2bde51e245867bfd0e191ca3eb9a06962054ce0ca044d90e21cdd324f2562f562db0b183066c8c55f943e5266596a841a6fd737a1c7d6ac7f1989adbdfed4b2fb6eccec9d335a3da42e7b447fb363e1b082bd18bf53d07672d6fa3c3e31f88fd5b2e48f69e47ef0c5f69271803504f59c5b7beb4bb9b474a02da9cb39d13a4a446fa6e72213db74704f9bc9d00ee9b64e4f83875492af8df05adb12f3bbf45501132323a58cf68a0a1fb3b4696ec01faa357b9a16f7d0fee11d1cdffa272d3b462d0ce14b639635aa7e9f00f8392161393adf3359139f8e0ce45b68f430d1896223dbea23e6aaa7307a87f979c9a4e97401eda43247c6942a70a6c3c7766b5a32aebfb5353c1eb97eae13a72e02a79452d46fca8cebc0ac49e2d06f175345064364b3925a73ae64f4c8caab6cf5305c8d6a092f1fa52f8a93eb9dc884b1aa11d3b4124b69910845f9e14f0c5b0f7c0fc2249b723d4d73f42a5f3333852049c2d081c85a0947eed33e217a891edf1b2f2d2d9ca0f9e0db98b2fcb4421c3dc9032911cef74426366ca7196e1a6e79c7966f43ba1507762c2c5c7eeeb3ef37cabaccec74e18a97737371bddd4275a2cf5ab32d847664b04bd9155575c94cc8e3160447805f8548d139235af3f03b905e3c99424b8d22cafa3be7f54e1fe5b9d950c23525c4ba15e83616d95e0c9e29034b12bbaeb4156506a3f919a8bf1d4c63b26417439d825966205626858912f4f794f40b7924c9dd5b10df1abcf4a107eba93f39afaf3fe6eb912d52687", 0x1000, 0x3, 0x0, 0x1, r0}]) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) D0307 12:03:08.093060 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.093543 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.095173 678849 usertrap_amd64.go:212] [ 21774: 21774] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:08.095346 678849 usertrap_amd64.go:122] [ 21774: 21774] Allocate a new trap: 0xc000a0ef00 38 D0307 12:03:08.095801 678849 usertrap_amd64.go:225] [ 21774: 21774] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:08.096321 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.096610 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.105525 678849 usertrap_amd64.go:212] [ 21775: 21775] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:08.105623 678849 usertrap_amd64.go:122] [ 21775: 21775] Allocate a new trap: 0xc0015dacc0 38 D0307 12:03:08.105906 678849 usertrap_amd64.go:225] [ 21775: 21775] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:08.107419 678849 usertrap_amd64.go:212] [ 21775: 21775] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:08.107500 678849 usertrap_amd64.go:122] [ 21775: 21775] Allocate a new trap: 0xc0015dacc0 39 D0307 12:03:08.107562 678849 usertrap_amd64.go:225] [ 21775: 21775] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:08.108061 678849 usertrap_amd64.go:212] [ 21774: 21774] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:08.108117 678849 usertrap_amd64.go:122] [ 21774: 21774] Allocate a new trap: 0xc000a0ef00 39 D0307 12:03:08.108171 678849 usertrap_amd64.go:225] [ 21774: 21774] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:08.111015 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.111737 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.112414 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.113528 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.113875 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.116734 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.119444 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.119889 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.126414 678849 usertrap_amd64.go:212] [ 21773: 21773] Found the pattern at ip 55c0f09aee1a:sysno 230 D0307 12:03:08.126495 678849 usertrap_amd64.go:122] [ 21773: 21773] Allocate a new trap: 0xc009d9b230 40 D0307 12:03:08.126570 678849 usertrap_amd64.go:225] [ 21773: 21773] Apply the binary patch addr 55c0f09aee1a trap addr 63c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:08.133363 678849 usertrap_amd64.go:212] [ 21777: 21777] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:08.133497 678849 usertrap_amd64.go:122] [ 21777: 21777] Allocate a new trap: 0xc008f970b0 38 D0307 12:03:08.134091 678849 usertrap_amd64.go:225] [ 21777: 21777] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:08.135282 678849 usertrap_amd64.go:212] [ 21775: 21775] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:08.135375 678849 usertrap_amd64.go:122] [ 21775: 21775] Allocate a new trap: 0xc0015dacc0 40 D0307 12:03:08.135456 678849 usertrap_amd64.go:225] [ 21775: 21775] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:08.136902 678849 usertrap_amd64.go:212] [ 21774: 21774] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:08.137030 678849 usertrap_amd64.go:122] [ 21774: 21774] Allocate a new trap: 0xc000a0ef00 40 D0307 12:03:08.137119 678849 usertrap_amd64.go:225] [ 21774: 21774] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:08.137714 678849 usertrap_amd64.go:212] [ 21777: 21777] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:08.137795 678849 usertrap_amd64.go:122] [ 21777: 21777] Allocate a new trap: 0xc008f970b0 39 D0307 12:03:08.137860 678849 usertrap_amd64.go:225] [ 21777: 21777] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:08.138888 678849 task_exit.go:204] [ 21775: 21775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.139144 678849 task_signals.go:204] [ 21775: 21780] Signal 21775, PID: 21780, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.139221 678849 task_exit.go:204] [ 21775: 21775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.139400 678849 task_exit.go:204] [ 21775: 21780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.141514 678849 usertrap_amd64.go:212] [ 21773: 21773] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:08.141627 678849 usertrap_amd64.go:122] [ 21773: 21773] Allocate a new trap: 0xc009d9b230 41 D0307 12:03:08.141705 678849 usertrap_amd64.go:225] [ 21773: 21773] Apply the binary patch addr 55c0f093bfa4 trap addr 63cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 60 6 0]) D0307 12:03:08.141824 678849 task_exit.go:204] [ 21775: 21780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.141909 678849 task_exit.go:204] [ 21775: 21780] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.142029 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:08.142150 678849 task_exit.go:204] [ 21775: 21775] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.142477 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.143007 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 12:03:08 executing program 2: timer_create(0x0, 0x0, &(0x7f00000001c0)) D0307 12:03:08.146888 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.147476 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.149539 678849 task_exit.go:204] [ 21774: 21774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.149748 678849 task_signals.go:204] [ 21774: 21779] Signal 21774, PID: 21779, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.149842 678849 task_exit.go:204] [ 21774: 21779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.150149 678849 task_exit.go:204] [ 21774: 21774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.151688 678849 task_exit.go:204] [ 21773: 21773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.151915 678849 task_signals.go:204] [ 21773: 21776] Signal 21773, PID: 21776, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.151937 678849 task_exit.go:204] [ 21774: 21779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.152032 678849 task_exit.go:204] [ 21774: 21779] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.152144 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:08.152340 678849 task_signals.go:204] [ 21773: 21778] Signal 21773, PID: 21778, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.152486 678849 task_exit.go:204] [ 21773: 21778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.152799 678849 task_exit.go:204] [ 21773: 21778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.152858 678849 task_exit.go:204] [ 21773: 21778] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.153180 678849 task_exit.go:204] [ 21774: 21774] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.154531 678849 task_exit.go:204] [ 21773: 21773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.154625 678849 task_exit.go:204] [ 21773: 21776] Transitioning from exit state TaskExitNone to TaskExitInitiated 12:03:08 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) pipe2$9p(&(0x7f0000000100), 0x80800) D0307 12:03:08.157048 678849 task_exit.go:204] [ 21773: 21776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.157151 678849 task_exit.go:204] [ 21773: 21776] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.157237 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:08.157488 678849 task_exit.go:204] [ 21773: 21773] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) D0307 12:03:08.169042 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.169653 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.174372 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.174710 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.175001 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.175302 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.175518 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, ]} D0307 12:03:08.175767 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.175923 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [syzcgroup, unified, syz3, ]} D0307 12:03:08.176101 678849 client.go:400] recv [channel 0xc000434000] WalkResp{Status: 1, Inodes: []} D0307 12:03:08.176704 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.177030 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.179117 678849 usertrap_amd64.go:212] [ 21777: 21777] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:08.179177 678849 usertrap_amd64.go:122] [ 21777: 21777] Allocate a new trap: 0xc008f970b0 40 D0307 12:03:08.179242 678849 usertrap_amd64.go:225] [ 21777: 21777] Apply the binary patch addr 55f99a050fa4 trap addr 68c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:08.181635 678849 task_exit.go:204] [ 21777: 21777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.181796 678849 task_signals.go:204] [ 21777: 21781] Signal 21777, PID: 21781, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.182055 678849 task_exit.go:204] [ 21777: 21781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.182205 678849 task_exit.go:204] [ 21777: 21777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.184536 678849 task_exit.go:204] [ 21777: 21781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.184594 678849 task_exit.go:204] [ 21777: 21781] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.184677 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:08.185131 678849 task_exit.go:204] [ 21777: 21777] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0xba, 0x40, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x26}, 0x7800, 0x80, 0x101, 0x7}}) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) (async) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x72, r1, &(0x7f0000000900)="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", 0x1000, 0x3, 0x0, 0x1, r0}]) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async, rerun: 64) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) (rerun: 64) D0307 12:03:08.192120 678849 usertrap_amd64.go:212] [ 21782: 21782] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:08.192243 678849 usertrap_amd64.go:122] [ 21782: 21782] Allocate a new trap: 0xc009004bd0 38 D0307 12:03:08.192752 678849 usertrap_amd64.go:225] [ 21782: 21782] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:08.195262 678849 usertrap_amd64.go:212] [ 21783: 21783] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:08.195368 678849 usertrap_amd64.go:122] [ 21783: 21783] Allocate a new trap: 0xc008f97170 38 D0307 12:03:08.195679 678849 usertrap_amd64.go:225] [ 21783: 21783] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:08.197428 678849 usertrap_amd64.go:212] [ 21782: 21782] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:08.197518 678849 usertrap_amd64.go:122] [ 21782: 21782] Allocate a new trap: 0xc009004bd0 39 D0307 12:03:08.197533 678849 usertrap_amd64.go:212] [ 21783: 21783] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:08.197577 678849 usertrap_amd64.go:225] [ 21782: 21782] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:08.197659 678849 usertrap_amd64.go:122] [ 21783: 21783] Allocate a new trap: 0xc008f97170 39 D0307 12:03:08.197962 678849 usertrap_amd64.go:225] [ 21783: 21783] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:08.199490 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.199835 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.201921 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.202288 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.206653 678849 usertrap_amd64.go:212] [ 21784: 21784] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:08.206751 678849 usertrap_amd64.go:122] [ 21784: 21784] Allocate a new trap: 0xc003d70900 38 D0307 12:03:08.207178 678849 usertrap_amd64.go:225] [ 21784: 21784] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:08.208423 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.208753 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.212228 678849 usertrap_amd64.go:212] [ 21784: 21784] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:08.212301 678849 usertrap_amd64.go:122] [ 21784: 21784] Allocate a new trap: 0xc003d70900 39 D0307 12:03:08.212350 678849 usertrap_amd64.go:225] [ 21784: 21784] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:08.213893 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.214213 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.219994 678849 usertrap_amd64.go:212] [ 21783: 21783] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:08.220067 678849 usertrap_amd64.go:122] [ 21783: 21783] Allocate a new trap: 0xc008f97170 40 D0307 12:03:08.220136 678849 usertrap_amd64.go:225] [ 21783: 21783] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:08.222282 678849 task_exit.go:204] [ 21783: 21783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.222616 678849 task_signals.go:204] [ 21783: 21786] Signal 21783, PID: 21786, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.222628 678849 task_exit.go:204] [ 21783: 21783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.222728 678849 task_exit.go:204] [ 21783: 21786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.224571 678849 task_exit.go:204] [ 21783: 21786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.224626 678849 task_exit.go:204] [ 21783: 21786] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.224771 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:08.224878 678849 task_exit.go:204] [ 21783: 21783] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 1: pipe2$9p(&(0x7f0000000100), 0x80800) D0307 12:03:08.241412 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.241804 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.241807 678849 usertrap_amd64.go:212] [ 21782: 21782] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:08.241926 678849 usertrap_amd64.go:122] [ 21782: 21782] Allocate a new trap: 0xc009004bd0 40 D0307 12:03:08.242008 678849 usertrap_amd64.go:225] [ 21782: 21782] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:08.243177 678849 usertrap_amd64.go:212] [ 21784: 21784] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:08.243294 678849 usertrap_amd64.go:122] [ 21784: 21784] Allocate a new trap: 0xc003d70900 40 D0307 12:03:08.243494 678849 usertrap_amd64.go:225] [ 21784: 21784] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:08.247580 678849 task_exit.go:204] [ 21782: 21782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.248051 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.248328 678849 task_signals.go:204] [ 21782: 21785] Signal 21782, PID: 21785, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.248457 678849 task_exit.go:204] [ 21782: 21785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.248465 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.248720 678849 task_exit.go:204] [ 21782: 21785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.248792 678849 task_exit.go:204] [ 21782: 21785] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.250955 678849 task_exit.go:204] [ 21784: 21784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.251216 678849 task_exit.go:204] [ 21784: 21784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.251704 678849 task_signals.go:204] [ 21784: 21788] Signal 21784, PID: 21788, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.251860 678849 task_exit.go:204] [ 21784: 21788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.253702 678849 task_exit.go:204] [ 21782: 21782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.253805 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:08.254684 678849 task_exit.go:204] [ 21782: 21782] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.255425 678849 usertrap_amd64.go:212] [ 21787: 21787] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:08.255649 678849 usertrap_amd64.go:122] [ 21787: 21787] Allocate a new trap: 0xc00046acf0 38 D0307 12:03:08.256182 678849 usertrap_amd64.go:225] [ 21787: 21787] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:08.256154 678849 task_exit.go:204] [ 21784: 21788] Transitioning from exit state TaskExitInitiated to TaskExitZombie 12:03:08 executing program 2: timer_create(0x0, 0x0, &(0x7f00000001c0)) D0307 12:03:08.256273 678849 task_exit.go:204] [ 21784: 21788] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.256405 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:08.256695 678849 task_exit.go:204] [ 21784: 21784] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x90) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)=')}&.*\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)=',#()/\x00', &(0x7f0000000180)='#!\x00', &(0x7f00000001c0)='(\\])\'{\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='-,\xb2!(\x00', &(0x7f0000000300)='.$\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='[$^*%$\x00', &(0x7f0000000400)='\\\x00'], 0x1000) r2 = eventfd2(0x9, 0x800) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000005c0)='./binderfs2/custom0\x00', 0x802, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000001600)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r6 = eventfd2(0x2, 0x800) io_submit(0x0, 0x5, &(0x7f0000001980)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000540)="9e31089cf87c6a08148270d72726", 0xe, 0xfffffffffffffffe, 0x0, 0x0, r2}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x9, r3, &(0x7f0000000600)="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", 0x1000, 0x738b, 0x0, 0x1, r4}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x8, 0x401, r0, &(0x7f0000001680)="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", 0xfe, 0x8, 0x0, 0x1, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x8, r1, &(0x7f00000017c0)="838043438c4cde92b1966bb26b609bb5ec1fe4d423cac5d9452768445a763dea60e30df441ffd04b93f151d40c34a520327e218c1755e6e093a87013fd62df2d76c0a9cea8e4a206ad42ca44fe17423b83510eee6b94d946e747386c0f2c7cb46c7892e1757c5ba27a6b88592bbf099ae29a2e2014a28f8b63a570bbb9032d55f27079447570ab85feba5709f4d78a070213ff9bbefd94bda5465808e3da6c", 0x9f, 0x6, 0x0, 0x1, r6}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000018c0)="92b4baf8fea429ac377f9426bb12068c72c31e5ec70c5b267c2e2834c7b4c7f82784720c7fe452cf2796d584c4fd99db57119ffca9ceddd2280e2cb3ab7ac5b51773509317c886c1c0cea22c7524501a36fd40e962", 0x55, 0x5c, 0x0, 0x1}]) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f00000019c0)={{0xfffffbff, 0x2}, 0x100, './file0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}, {r7, r8/1000+10000}}) D0307 12:03:08.260859 678849 usertrap_amd64.go:212] [ 21787: 21787] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:08.260924 678849 usertrap_amd64.go:122] [ 21787: 21787] Allocate a new trap: 0xc00046acf0 39 D0307 12:03:08.261025 678849 usertrap_amd64.go:225] [ 21787: 21787] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:08.262778 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.263194 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.272533 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.273118 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.273572 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.273994 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.278253 678849 usertrap_amd64.go:212] [ 21789: 21789] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:08.278391 678849 usertrap_amd64.go:122] [ 21789: 21789] Allocate a new trap: 0xc000a0f200 38 D0307 12:03:08.279252 678849 usertrap_amd64.go:225] [ 21789: 21789] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:08.292187 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.292545 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.293081 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [, ]} D0307 12:03:08.293286 678849 client.go:400] recv [channel 0xc000434000] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.293392 678849 client.go:400] send [channel 0xc000434000] WalkReq{DirFD: 1, Path: [syzcgroup, unified, syz3, ]} D0307 12:03:08.293415 678849 usertrap_amd64.go:212] [ 21789: 21789] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:08.293480 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.293515 678849 usertrap_amd64.go:122] [ 21789: 21789] Allocate a new trap: 0xc000a0f200 39 D0307 12:03:08.293567 678849 client.go:400] recv [channel 0xc000434000] WalkResp{Status: 1, Inodes: []} D0307 12:03:08.293572 678849 usertrap_amd64.go:225] [ 21789: 21789] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:08.294227 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.298217 678849 usertrap_amd64.go:212] [ 21787: 21787] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:08.298309 678849 usertrap_amd64.go:122] [ 21787: 21787] Allocate a new trap: 0xc00046acf0 40 D0307 12:03:08.298396 678849 usertrap_amd64.go:225] [ 21787: 21787] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:08.301501 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.302044 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.304634 678849 usertrap_amd64.go:212] [ 21787: 21787] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:08.304761 678849 usertrap_amd64.go:122] [ 21787: 21787] Allocate a new trap: 0xc00046acf0 41 D0307 12:03:08.304873 678849 usertrap_amd64.go:225] [ 21787: 21787] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:08.314890 678849 usertrap_amd64.go:212] [ 21793: 21793] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:08.315027 678849 usertrap_amd64.go:122] [ 21793: 21793] Allocate a new trap: 0xc009004c30 38 D0307 12:03:08.315363 678849 usertrap_amd64.go:225] [ 21793: 21793] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:08.316480 678849 usertrap_amd64.go:212] [ 21792: 21792] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:08.316561 678849 usertrap_amd64.go:122] [ 21792: 21792] Allocate a new trap: 0xc0098d7980 38 D0307 12:03:08.316868 678849 usertrap_amd64.go:225] [ 21792: 21792] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0307 12:03:08.317309 678849 usertrap_amd64.go:212] [ 21793: 21793] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:08.317440 678849 usertrap_amd64.go:122] [ 21793: 21793] Allocate a new trap: 0xc009004c30 39 D0307 12:03:08.317512 678849 usertrap_amd64.go:225] [ 21793: 21793] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:08.319887 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.320385 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.323121 678849 usertrap_amd64.go:212] [ 21792: 21792] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:08.323179 678849 usertrap_amd64.go:122] [ 21792: 21792] Allocate a new trap: 0xc0098d7980 39 D0307 12:03:08.323248 678849 usertrap_amd64.go:225] [ 21792: 21792] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:08.323772 678849 task_exit.go:204] [ 21787: 21787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.323983 678849 task_signals.go:204] [ 21787: 21790] Signal 21787, PID: 21790, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.324129 678849 task_signals.go:204] [ 21787: 21791] Signal 21787, PID: 21791, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.324170 678849 task_exit.go:204] [ 21787: 21790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.324431 678849 task_exit.go:204] [ 21787: 21790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.324486 678849 task_exit.go:204] [ 21787: 21790] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.324596 678849 task_exit.go:204] [ 21787: 21791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.325020 678849 task_exit.go:204] [ 21787: 21787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.325395 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.325811 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.327011 678849 task_exit.go:204] [ 21787: 21791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.327076 678849 task_exit.go:204] [ 21787: 21791] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.327190 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:08.329261 678849 task_exit.go:204] [ 21787: 21787] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0xba, 0x40, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x26}, 0x7800, 0x80, 0x101, 0x7}}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x72, r1, &(0x7f0000000900)="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", 0x1000, 0x3, 0x0, 0x1, r0}]) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0xba, 0x40, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x26}, 0x7800, 0x80, 0x101, 0x7}}) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) (async) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x72, r1, &(0x7f0000000900)="d1bf946bf6764daed04b59bbc8da44df6efde6519b8eb0e02f46b6a1b0e696974f2f775e4f948581a8d49f24202ba9d9dadfbf95df72331058231b3515ee833d4da27e05f6cad675261ee31903a2117b6d2125f5df7b74df4180da5da299130f2905d3a1dcb22537d8bd24aa1244120f637d1105dc53642788126c299e5020e7c46b4d86806d1bcb91c0923e83df687eb17ea6d630a5ce1afa6326caa0d1114e1f06eb869386536d8d97281763b866c518d982334a062429e4352115e4a838b8f69a21a7b74ff52c6c6fd67a53b8096a8f21f620732d8128c9271793d4dd2832fc01829906731e514af50ff9a421536969f4f4772f79571c01ad5f4138aae4121cd7b9eb2e33474193352dbb7c8d38a99af9e49bed0c410c9f5aa02540ec512b787d85f8d2854758a40ac47ae594cd617a06499b4a77852bd2f82bc897844cb453498675832316552a70fab05ecd57b6a9a862afb46b8b5473b0aaf4cee69c772799ca9c6008f0a5e329fa2cd05f47f8353454b28852db79d1caf3ebfbeb73fa2a42470218aabdf8c253a1fd42511900bf69fcf00022447e27bc547e8683d6238e6c7a29be5997520dad70436f79c5551c87ec199cf8db5797c1a663ee137bdd497644ebbefce0354c5fe6fae0dde02c53c6d029d08c32cb3c30f9b1f5ad29fa8d877b09c2753ce565694944c6fe353c2cc376a935dceb8fbdbe57e74b824912f516d2eab9bc35ce617b0a294e680dd46292734a8c1c04f253ce414891db743c886197f37570f5f872b77e8ced4f672c52489e129d0b31a6d6258ac6b613e45362ce95853a6737a3e953d66c078c33f80f00d51f3ab615f82b5d322764d65929763d145925021a5c9fcc6b73cf12c60a740eea662b10e920ec99cbaa1266f69628ad92a3470dd4834d71ef1417a5c44ed9e9d726744bbb161bdd88b7ebc58e67a33d6ff2bbd6986b9c0bd5572097ff4344b36259a53338d9d2e70b12dd8389ee5af028c9ccc230b314bb6cb8a70022df5b5a7c203e22246847b889854a00c5a497a04d5196eb57c38bce6f7d905d2bda78345dabae918f36488c33ea16d84d544217490a3088497927e6d5ba9fb24761eb784a1cf1dde619048290efd18721046f843a2a9981497061294895009b46035d7f820a21f699bf208a4a536a1682632dd5e1a485bc5d7b9ce51f2ee7097d4e485746c5ff9283395148950e17eb9e50d0c8eb045282f8a82d5819aeb49d7ff4225ad80265660eb9b640f2ab60213e3e88f906bceb73698d2ab014b03fe0c7709d7248dd1bcd38a67b793a869863591797605f5a498aa1e587168ee784437c381005ed245e462b0b1c47ffa43dbd0e26dc0f4fc26296d91c03cc13db71247bbe23aea3b01ca73b027e07a768a31bfa4d21a25d95cafc1be7bce9b6ccd76301840e93904d74db6a7e7fe04cf5016780b947f35e1c0546e49de4b8d0a363db2d6adb2f31e6030bdfe03acd49c3ce1b9091d82f630819d2123379eb7d71cdb1b374ca3fad0ab6cb4d86a15bdb3e432995d48ad98844805ddbfe2969ce10529f52ae26a47f1681714c1a39f4cc6bb1301c73641a42ff823460e5b45b71e47624c001e24313772057744c776fa0aa8a28d90856b94e4e735b5f817035cde0fbc74d9186270ca3c71c193fb3b477cac423332a3f32f78344527021fa52e64213cc5c69176d809a115e83cc43b93df3bdde6cf275245f122678a2cad887baceb704c78335c7757bd34cb6c5b6ce77264167bba46bb551eabef02a89736d1bbe0d676ad436f9c8d1e0861236c545a0a29266cba4c27d864b240c47068a54376d8d01aac56da94c04503e1fb685efcbad26ecc9875a03f8fda833bef39ca786f1c4f0faebeb554fa12b3e3a5aeb0370c77192564b14179144f60e8fd95410d96c9c6e040e08e88537d61093248a5c54e5e99ff394c670afaf9ecaea73010faf6c1df89208ebaf3733dc684d6568454b436b97282f851d6dacf96ac8d676c005a045d12c3787d8c46f450c1b7f0bbb8837f67d2a7b6668cb915f2497b624d2e35ed441717c8285f8f615c78bc16a8f60fd2eb21c2d320371d21d0a07b0245d68f2913cd38f4c4e27c5793532590bca331aeff5424f7d3b8361ee3cd9e176ca7eb60609d85816b4936db7f796a602aef4b422677f01359654125c816b994d542c25e50e9edbaaafa1e4924f18634e89f8742a9c2887d5bd6caf9a2a5a228399ca3cd1a2abec36feb415a4e4353dfb440f290dbe3e1b8d48ea1a9e4625f743a1cf472b731764dfa5650620608d0eb9a106dbd31d284b0167058a7dbaad77dd5affb7c01609cfc4f757b2ba7eab25414bd37d88ad896a384eb75105ef9bc750e5b618f41f0cf36f3327247846f0693251fe48cadba5b710101d44cc210b44e9daccdad6482c5020e57e4c03ac3fd1aaf13d948ef0b4d696c4847a2a76ad401ddc74d722eeb3ff70457b922a91567f20c408f21b6b4529489b9c9a20d8b6a38ed8aa2fe13d86c97689df4b7d087c8d95ed9443d93a33178b0e37d8bf281890f8e8f008807fd1976fb5306570e04eaf528a48e9045200140009c2c85c351af0eb0858af79f21f5d4e4a383ffb50ef10f0fabf0ca48d4716a288e87305ce6da9aa17031c9177937415551acaa0b07dea3ce44462adf617d9e265f18a1267671762f00f93dc7ee396f54e6b55c99d713367a80826a48a9e64d3bcf400e6797248ccc73c976e829875bf88f0e38f404987cac0ac28ab4a6b210a01771d33071f457a0cbe9bb7cfe9ae9f9647f354604595a03dc0b57acaddf2c1cf951d17ee1f40e1595e5a8d20f99f86cef861e278dc1586691fe06f4b1e391cddf275fcf368cc3f25654dc347a2cc010d0ae2a73b58c25e170fa1ad0bb9ed31421b3f7015bea15f794b68844bb6b69c83044d9f4bea832059e51eba9cac039ae0884d6f7891720cbb7dd926d7e14d6227ce3bfd8f8f26ba1f2248a5bb429d98d2ab277cd53266da6fb1c6167ce55ecb36f5a06a9b7570589fcc26841078c80a6967774c0c49cb3f680929704bd1c189834a84da2bcbb5a15b6539300406b85362fd058023c0f5cc32e5d9c84f76d56288d299e41cb66e8cdcf04956ac9e26bea9a38e2ab4378d299a07d79bc3af4ac66f07977dc116d9e680e791b8e01bea15a521c5ae02d822f0a0f580cc8499a1ea18824f9cc314618cb4d6e608178b31ee3d1ffe517e3f2cfa3c8214ff7c3e8e6c43026abced5d9b1e3e6e302969feb3dc1e51d703b27f429d2bf1e6e9d95cd9d3b08f1febb0e769929c0eda5938224d7a21fd2fc44d8c075f9431080d6d9c1d481672b3dfc6f7b13714ad98446b002ae8ffc2ef14b4321dfe654e04852c85b827781e2930f862c8546fb28b004993706c020eb5c8832c6e5849a74ca655a7e77e3aced8589bbb9c5587520e7c705fd1cb4b4ca7baf41bb6bdf90ade2c506255038ca2f9567034b1f08c3e89660f65195d4bfbd76751c6618690f981c0e920b37cd974443fa79f74716dfdb5ceb39d92b0b8f91affe5d878c9f614c4109c76103981faea631f353fcbf8c7990a6be86d5edf1868c90e0be028c84c4469a18d4ab9de21ae3e9b060aeca6652d5e6a9d4890e3613572dc32d7a7ddd925ff12179e492412a537484820805de06bb0c7cc1da969cda70d0af1c8c2f1f79cfb52d8a81b7283e0a7a06212707f74a1532ca6b8fa3a8b6fa6479336d79d6271e0e7380237f3e1692a6d7691340e06fb0f3e19b6fb43b78f3fef99c141a0d737d6b60030f47150ae00b2064dc73e6761e9535841c807883e51e90dc858d26078e55dbec2f99a874936491ad6d5e042af9a6eedfb28aeb31ece88d60e20a15354064c6d314f53eb6573ddc21e0052b67d9239b22b1ce351c1508972dfdc7b976d01a0752615fa3cd345ca9a7ad42e3045c91654c97336877b0d23150271b0d28fe881414bf53078fd84807d98bd1912a2f007c74bf45c6d4b6376282fa5f47e00f10eb564b8987bdff788b519588f6e92061afd2d436aeac0a8106b38c176deadef4a69b7362cb9696a216c7d7d98d800b38684c7e63a70d45fe7cd5c4ef293741d91bb12fcfda5475d03e3b27545cd8bdade9a152089cae41baab014bc26f4f0d56c18ed678b62a23f26582c5e507a3170f9047a51f1a015fb8dba65e1f94675cf8570a1583bba6705489b45dd056ba5e4e688a6c1bb8a9cfd6866193c23e4c7db1f27157346d8e31730502a7dd32c539e9abdda345d08b3e8a04b1a67a89f5dd339213066ebbca95c0c25c8662e8913de6072407261a2f6c861805874de0d5c952c6c57561530ddeb41d4058eb03a399f4e9a9f97f008e04f4be10329b69bd28c11bb432569a0acf303ea9a9da2aa4db38ea0661cb2b27ac4cf017e0f6d547f2e7c2a36ae3e544de0dd4f3731880fe819d8b7c7964f94827876029445c9dd42a140d13da507e9af6f65f2b903b320f2dfbada4bf65d3318238fdb8b8f4e6bcc9ef17de33a322f022d63cb30729d91a5b8a28ac25634326fad30ef1a1e56ec768349a11fedd4d248b65d9f2ae4569a9aa1763d6bdce3aa60af987f72e23f764b8c1de8bf99a324b50a74fa9b27421ff406f5d622582ad517d3b1f292cb550b030a9ecab14b840b0966eeed1359cf0989b02c7be938ee2a0d926ad47e9bc7a76f719c236bdbfaabd83fe3375638b68ea7ca832794060933fe66c150f5a6e10540850d80e9f282567bbd1169e255e0332d0c3e3cd827762bf13565e2c7153410abed28b5b6615986f8455f4ad5ad3fb21e9682469e6d35b96271f5dfc1e70418f86a5a24adf80e4c1902f50fbfae586bcd4a698cc69a13524c26989498ae82b41200951e93e3713c2aa1d8a9341bfee171e69b1fc04e24f3d712999c8ca7504a81ef2159c0ee0f9e9d9019ad6cb3f7569ffd0710885a5da9313083baee1d78cbb82c5c883a68822a0864924bf5b8afcb512a263209486487405fba88b6c11c33f5601fe33daebacc153e2bde51e245867bfd0e191ca3eb9a06962054ce0ca044d90e21cdd324f2562f562db0b183066c8c55f943e5266596a841a6fd737a1c7d6ac7f1989adbdfed4b2fb6eccec9d335a3da42e7b447fb363e1b082bd18bf53d07672d6fa3c3e31f88fd5b2e48f69e47ef0c5f69271803504f59c5b7beb4bb9b474a02da9cb39d13a4a446fa6e72213db74704f9bc9d00ee9b64e4f83875492af8df05adb12f3bbf45501132323a58cf68a0a1fb3b4696ec01faa357b9a16f7d0fee11d1cdffa272d3b462d0ce14b639635aa7e9f00f8392161393adf3359139f8e0ce45b68f430d1896223dbea23e6aaa7307a87f979c9a4e97401eda43247c6942a70a6c3c7766b5a32aebfb5353c1eb97eae13a72e02a79452d46fca8cebc0ac49e2d06f175345064364b3925a73ae64f4c8caab6cf5305c8d6a092f1fa52f8a93eb9dc884b1aa11d3b4124b69910845f9e14f0c5b0f7c0fc2249b723d4d73f42a5f3333852049c2d081c85a0947eed33e217a891edf1b2f2d2d9ca0f9e0db98b2fcb4421c3dc9032911cef74426366ca7196e1a6e79c7966f43ba1507762c2c5c7eeeb3ef37cabaccec74e18a97737371bddd4275a2cf5ab32d847664b04bd9155575c94cc8e3160447805f8548d139235af3f03b905e3c99424b8d22cafa3be7f54e1fe5b9d950c23525c4ba15e83616d95e0c9e29034b12bbaeb4156506a3f919a8bf1d4c63b26417439d825966205626858912f4f794f40b7924c9dd5b10df1abcf4a107eba93f39afaf3fe6eb912d52687", 0x1000, 0x3, 0x0, 0x1, r0}]) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) (async) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) (async) D0307 12:03:08.334022 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.334425 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.341759 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.342637 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.343066 678849 usertrap_amd64.go:212] [ 21789: 21789] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:08.343183 678849 usertrap_amd64.go:122] [ 21789: 21789] Allocate a new trap: 0xc000a0f200 40 D0307 12:03:08.343293 678849 usertrap_amd64.go:225] [ 21789: 21789] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:08.344867 678849 usertrap_amd64.go:212] [ 21792: 21792] Found the pattern at ip 55c787df3fa4:sysno 3 D0307 12:03:08.344974 678849 usertrap_amd64.go:122] [ 21792: 21792] Allocate a new trap: 0xc0098d7980 40 D0307 12:03:08.345062 678849 usertrap_amd64.go:225] [ 21792: 21792] Apply the binary patch addr 55c787df3fa4 trap addr 60c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0307 12:03:08.347316 678849 usertrap_amd64.go:212] [ 21793: 21793] Found the pattern at ip 55c0f093bfa4:sysno 3 D0307 12:03:08.347376 678849 usertrap_amd64.go:122] [ 21793: 21793] Allocate a new trap: 0xc009004c30 40 D0307 12:03:08.347393 678849 task_exit.go:204] [ 21792: 21792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.347462 678849 usertrap_amd64.go:225] [ 21793: 21793] Apply the binary patch addr 55c0f093bfa4 trap addr 63c80 ([184 3 0 0 0 15 5] -> [255 36 37 128 60 6 0]) D0307 12:03:08.347592 678849 task_exit.go:204] [ 21792: 21792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.347933 678849 task_signals.go:204] [ 21792: 21796] Signal 21792, PID: 21796, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.348100 678849 task_exit.go:204] [ 21792: 21796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.349065 678849 task_exit.go:204] [ 21789: 21789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.349209 678849 task_exit.go:204] [ 21789: 21789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.350082 678849 task_exit.go:204] [ 21792: 21796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.350141 678849 task_exit.go:204] [ 21792: 21796] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.350203 678849 task_signals.go:443] [ 30: 30] Discarding ignored signal 17 D0307 12:03:08.350299 678849 task_signals.go:204] [ 21789: 21794] Signal 21789, PID: 21794, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.350440 678849 task_exit.go:204] [ 21789: 21794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.351283 678849 task_exit.go:204] [ 21792: 21792] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.353435 678849 task_exit.go:204] [ 21789: 21794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.353540 678849 task_exit.go:204] [ 21789: 21794] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.353671 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:08.354638 678849 task_exit.go:204] [ 21789: 21789] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 2: timer_create(0x0, 0x0, &(0x7f00000001c0)) 12:03:08 executing program 1: pipe2$9p(0x0, 0x80800) D0307 12:03:08.362171 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.362624 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.365940 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.366451 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.367559 678849 usertrap_amd64.go:212] [ 21797: 21797] Found the pattern at ip 55f99a0c4490:sysno 109 D0307 12:03:08.367652 678849 usertrap_amd64.go:122] [ 21797: 21797] Allocate a new trap: 0xc0098d7a40 38 D0307 12:03:08.368047 678849 usertrap_amd64.go:225] [ 21797: 21797] Apply the binary patch addr 55f99a0c4490 trap addr 68be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 139 6 0]) D0307 12:03:08.370267 678849 usertrap_amd64.go:212] [ 21797: 21797] Found the pattern at ip 55f99a09ea30:sysno 266 D0307 12:03:08.370406 678849 usertrap_amd64.go:122] [ 21797: 21797] Allocate a new trap: 0xc0098d7a40 39 D0307 12:03:08.370586 678849 usertrap_amd64.go:225] [ 21797: 21797] Apply the binary patch addr 55f99a09ea30 trap addr 68c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 140 6 0]) D0307 12:03:08.370846 678849 task_exit.go:204] [ 21793: 21793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.371104 678849 task_exit.go:204] [ 21793: 21793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.372876 678849 task_signals.go:204] [ 21793: 21795] Signal 21793, PID: 21795, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.372982 678849 task_exit.go:204] [ 21793: 21795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.375440 678849 task_exit.go:204] [ 21793: 21795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.375561 678849 task_exit.go:204] [ 21793: 21795] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.375665 678849 task_signals.go:443] [ 29: 29] Discarding ignored signal 17 D0307 12:03:08.376695 678849 task_exit.go:204] [ 21793: 21793] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x90) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)=')}&.*\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)=',#()/\x00', &(0x7f0000000180)='#!\x00', &(0x7f00000001c0)='(\\])\'{\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='-,\xb2!(\x00', &(0x7f0000000300)='.$\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='[$^*%$\x00', &(0x7f0000000400)='\\\x00'], 0x1000) r2 = eventfd2(0x9, 0x800) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000005c0)='./binderfs2/custom0\x00', 0x802, 0x0) (async) r4 = openat$cgroup_ro(r0, &(0x7f0000001600)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) (async) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r6 = eventfd2(0x2, 0x800) io_submit(0x0, 0x5, &(0x7f0000001980)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000540)="9e31089cf87c6a08148270d72726", 0xe, 0xfffffffffffffffe, 0x0, 0x0, r2}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x9, r3, &(0x7f0000000600)="e59dd5cfee8bc8ac488ce76309e879a6daf855a93c2fe3df33ca674aa165a45d8a981c4b6e133530ac105ebeaac65ccd5a9478bb27ae2694e22f6c7c6886692b44af752dee668adce8da5098809cd65c81de71dc438eaf08450ceb8f480825915ce60a987b52539071e8acc2766bdba1a1b53d4298ed6cad81f7d15c755aca7ead807edabe7dfa1bcf80e79309659e6e98800ddec8a8083c104069b6a20e7cbf8539a6d2841563b8dd11219dc3385b29b6cf1bc223ccd9e94507e78cffa4f0cf5f7f1677b902a5ae759b612b6531d703ec1920a37069c7390771d8237dbd9efb6676ecc6009fbfe35d902da7af3d87ed26fb2bdaec7b2131f8ca03bee379c7f81629edbf473e2c0be3c9163a9c33ca7301b845ab72e13594dba73d168a71441866d70b3805771f7902303840325ac4531c207e56cff0b05bf27cb8d1f414ad566f5bf182c6743f6bc727a49e57c3fb186b74445eafa61a60e3d1b97c510c9381ed1939a23d896f5d7615fa18146faeff9293392d2ff897d1be13cd21d74e9df95483e6a643a4622adafbcab60ebf03b7407ec7258e156ae4a3477c8347d698b51e98a6ed07515ae608cb773e45a1d46d0c005e6948377d5969efe18f4f2a7ef7d6d045beb6471744782875e85672e73774d096114e8d6116963088f6e01871daab89b35fbf9d9120a4a503f312459de649347b925920a176d124ffe56db98fb6a9f0d7e12b234aadfc0ece69666905b83f89f40ebdca02feb07c3049efaad1fb7c9db0c2167af5b805b3cf63f0548b08795384dff8230a6a2843676b06fcf1bb7f1e84c48eab121c7765e08348ee78d594256cc39c83bf566be914cf11855be1b6404432ea775263edca34c265cbb36e7942c276d22068a328de609c7db8cd3897aedea840652844e11dd278e7331cf88ecc3f0e556939455a4778333c77ea4867b5acb68b19f253bef4e0fc1f1e321a939075ea7cb75aa0f2f45bbf466a3230531699dabc9bc8ef4115b157fb2bcb1fad1412ddab23f4983b4985eb4320f094b7f2ab548f49a830977dc3925c7e86095bb8687c08c8daa2610d5ba5028e05231fef0700a7bdd97e87f2c1c31ec9e24685c4b2fbad050d8fb5e39bcd0e563965375601ad116279789912a7957ac7adbe159c40212bddb4fd29ded64c218e4ff27f6519847fb70668fa56ea16a88dea18b6abf9713fb0dc0be77b23c4fd0fe78ffe82e4b402c88fa31f8124b002dbf85c99fcecb614200c2e0a2ae0be33aae31945857bc7edf19a6ad3601f92f6420be9591605ae98f1c11ac099eec68c95898c537f4f058294d4016cffe6d0f6389056bcab145b5ca67ad52477703209b29f2033cd32b273eb14d1b6ec0c6f2ff56ac5c48d43c8d2536d86030f3688a698241fa394bb56820e4ecf94060093ab47d731127f18396af92d4b7813010b68f434a5a201a670cd62aee36dd84ca047d6fc11237e594f372516426e688210ed9cc1b916cb836942c54986b82bccf140f58dad35ce68503b72790fa8210887aeeba15848c9fc00bfbdfe58a22cd1e992bf749827fbf773a5202dd78dfa3b58d0374393088e8c2495895dd919b5e58a2d02c82718f390a27e04c6401f50ca135ad4d774fa4abe03310ad811e1da8ed112bfb35d6cc96473eaf85bc2ad3acb258fe8fd8b08dddb9359aa0e3880a11d36b5056a1eb1c042eb8941ea40eb80cff755511a469700deffd3ae09689f5839d6fdbc211963f54304d3db8f3caf16888a27fc2e0174a235842efb974fa3d5871ebcc391b3ece2a210bfbb53a8160d393d0b968f3fe6bf35a4535d4cec3f591020299b0ec73517eb22272802a0d7c898930b7a074f27bc5815eb0015585820c07d3bb9bc6fcd29a92f8c365d85cf3d160f12308a459fe023f799e4a3108d6bb3640635f5fd11b04504c899605f65fdd2d47797e294882efb9f307f9fb5c94fbd5921b27dc958ba893a29a21913bdb583f3e06667007d1aa1a205f87c6053c6e644da0893ed113b6beae1e50702efb826b06062b132c2864ee42bf1615618985174b27900b436014e1a4436b5f6b4a4651b469d9468a0967444b418e40ac10f31d2d34eaeb44283b7f21fe0dc149380176d80e1d5669fdfbc31f56d45629dcea87fcc33e687187951ce75ef1557e9929c14b3464fe4323ce725a494bcc0a8fcdd2f759bec4ceafb1b924ace327063b08b19d3c9bc429567ca5f0d3cf9b88de338c788753fcbdd6a852b68598718678fa9671660d85f03887f2c3dda06f28bcfd1c157e9619dc5b81a8df1c6301b238e771c593ada98feb7201366767ccd38b19e19aa74a80613e17e32c547c10d1e4b60aaf6e36c9495db24ccff7328d13e89a6c3e96e139dcee56adc147e0724815b4e95307c61dbb60d3b2aa7df3ea92fc1a2b870d5fad82dbaf9f40459c8ee5054f021acf60d0843c326e3a4a20fcfab992e921d0ec4ad5b3138f3497b59035b8c238ca6abc3a8fe0187e8fcf7f1beee21512a2c333f42300353a72a512ff39d69f33767cabeef65f30dab78832796f806c8521a1d6401a5752770668fd4a74177f4338090e1834cc9faef405336d2c99d8789d5f4e32037d96b9d3a9c79a9cf166d60c4b776b46e12efb326ffa82bedefad652ba713c541a6993fe791831cffc40ddc57e629485cfb5c6eeb3db26f7433afa1b8680210b0ead9483b69175396d045a994b1c3d0c36cf76a33da9f1a2ddfc99c63b2523abd3e0ab0035df8f80f5499b8f473b4b37df1dd03c0b78f959035c054ca2679728bfc1103c3073fa4a60195194f52698207285a2a73a30f923e0eae12d429bf65c3cdfd5086beb5cc842f8d0ef9850e41c7fcd33decc5dbacca41d0fd943a98d4e36aeb68ce04f9e07714d2b28cdd6601c87fe87e988ba8488befdda6b1677ff5f0b40d51e12e79db3a5e220eefae8605971abadc894b9996b77249c7812f44240703bb19cf1d67c952e00a076aab5a82fff40a610b80ff167777953a93ab3f8f2ebfe164a23c5791bd8a0461ab7b8c460129cb3dd3a4522b19ddf4827744321343778da63c1dae1620004d826a75aa97777a49e7843522a536ce98ce1ed37da13b49975fc3baf207a9d646e0fc3c1155c33c6a488a095083c8e016f0a25610796b987fcecaf0d3b32408521a8ea5be7829ac0f787a3fd57756451b3f8ef8597c63855b1f7135b12dde9eb9a4f540bd5441e799fdc3af90f3562bf3767d0c22dc2732d9e8bbf4ea5d0818d6017af5154fe21f9493480cad28a119cd428786b693bcc273ecd8617af99d7c10899cbe6fc2b81798b2f3f1fe257568f03f1db35ce237cf0e0357e24ff522dafef07344d742258eecb810c0dc56eba40b373ba9ed8a86529b35b23b739d7f6baffd04519aa4823b6b59e8cad3509886dc1e7f107c32bb299a31cca84c93a30d10751259c77fdc3d66cefa73f077b3a78922764d95e270e3188383fddef1bba42f5d859588ebb42afcbe5f6be5e0f7563c7287100253fb5c7b52da0e254f48d5bc6ed7cb9f6c75c7066a0b7d6048e6d3a90a8290b56e6202f44be292936c479beeaff151c91de95aef8efa114fde0da73a1c57477a7b934c979c5bbca79f48efe4e8ea31bf9fce0435999f4b897b92c96da127f468a04bf322589b87b0542a36331d95f108bdbc17ece790e8f3b8074b8ee5b35c243390b6671f70a8bd83550277e9c42bf524df0a0dfac9338f1a36f3d8932a0c18bbad11f7babc0aa0546bbe569714a1abb5096ed134c05a83ff8c5d11616484468b59908c4d8861a60daeba95cbcd0516144c7505237d663f0305edd591a4577ecf83985635ec623c4358beaff4cdd1d094d67b4423048314566951dec208c524b6ab958f9ffbb6fda26afbb8e8ed1457047dc6994ff62c3a3f2c3c5834b209dfe2e4036e4288ba9381483455137f2d272de9ace978810437c93bdf690c836ef3046680bab349ec19f8b553873759699d3db7fd9522a6ab4070805edf863efaab2b374dd2008a73feae83e5e3fb46e66d914d5b6c9d9870fe06994576c116ef6e6c4318375e1c4115d256c0f0842571b1661a2ab32bce019c13ae4878f5f6e7081c56b8f2c9eeb39097330df453893f5bfbda41a43fc66a33426d3800de1ecb3568777d5aa9953b54217b9de7ae1fd447ffa3f142803e86871b769efab27f29e84de45b785d06cd5b61de04de48d67b99a35e6f5167f5c9b828e763f5eb9eba5c56e772b0f75e782194c1194ee314a36aa6f117ef7769ce069528461937f86a46122d17f866f843c0dd4c3db16b8e7a89bc204ad168b578314729d156cc611510981002306d765ff6f36e6a3defa10b5aa72f623f1a1e2ecd104ff1c60f485bbc989a32506f31cbfb88453dcdb652dd6720f33eb8de7deabbe5812cef668bfc55cf9441a64e2f2bdd45a187f56713df0c57c733a631706b20227991dd47cba0ec44b2b2c70ee776a0e40292306227b686d6218c529214782f2360a0ae1c47f1e0a7eefd9a3fc677be5d78a15696cf2789f1806464eb9189f35b6d0a839a0a4407d7b50b10b329fb09dc1dee88bfde744dc857f155429095e79254b6970954ef3646b4552a0d72961d23e63efb0a8c497066c4b8a77152e277aef1d27ab3685b2fc3367e6477d80fdcb550be11e73d0e7e9388333a76cd3747c6cb21cf55c20c490c557780becaf2bb8a06d8c6249d31aae714552534f18ab560444c2c45b4c5c2063cbe013ad11cd1370b07dab3249f5f395f3382479c6b0b27c59e727fc032c04b2361804098116c0319d73f6f94b3293e7b7dba285267f518250b9478d606e472d882e6f01e8964d67601c837b169dea44248d46dba27e62143e2196f5dd2e1be24f48cdc051226b208449bf503b4822e025a9a32b0c57d58a3ee636c853d93cc09b7c3812da75b4a1c5e8ea90cbbab21016836dfb4c50fb82496e37ea6e791a3804abb44f6212d1aa049092149b0ea11885995f077a5d88b5ce71c1ad6c1b2e7e31f623daca603f34cd8809a87af5ad3b579ffa2fe5f2b52534a709010265b63ee01914143289825caa96aa5d15cb0a87ca6df7687821aa3eefcc364def987915ac44c84ad121e7779923041e91e6cb41d2b356b09d8b1fa7d253fd21d6ab28d50589a7a8a5d495765760900fa49eee196f5ca36b9ca5995d56fa3a185a44c3a41abeb3087495a638262fa358430ae13d5179c051eeb99b3c83c1110936d0278d792b70539b5b02c5e10996c4dc5f3d5fcdcd209c7c0f7a8def8ab27f15884176fa9a8ca5e8d0b1fe09956764c92945bffb0e933ed4ecad5dbf9a65a49f8005ed3c8771e5555a9124b55f90a342dbeb32fd3ddcfbd25458eba4e6650122957d80e23985c683603512cb27deb415fb3324c480af4c69f0271fecf738bdf8f860fdec62d289d083c4941dc094f055deeb354434322d72bbbeddb62b3bf9408a365fda6b3510ca4a600e1e90650ae4e604c4a01369f6724c0104af446989c19e2a23281a20e7be58d02b88f0c7ce19cfd3ac18bce67b1d223147934cccc0c4456435816b3942974545f6e9b9441d22f8c608f67e0dcba3daa9eb0afa8aefb4636ead2d7526d21f022a5bba2f035b0f3a761ac59d9547144dd75cad0905a9e0d1016377d1d6b1b33c4107f1e683fda1b97009429d1fb3153a5312a74122c7d30056cdde6a007bc512441d7a43157c4289d43a6a83532463c76ecf565c457dd16ebe2a7bbb0e2e2e3d74ed35644690595585a33a9564921e58fa740901f0329d52bbdea0fc9389c22ea1ecf8d787f478ab188", 0x1000, 0x738b, 0x0, 0x1, r4}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x8, 0x401, r0, &(0x7f0000001680)="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", 0xfe, 0x8, 0x0, 0x1, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x8, r1, &(0x7f00000017c0)="838043438c4cde92b1966bb26b609bb5ec1fe4d423cac5d9452768445a763dea60e30df441ffd04b93f151d40c34a520327e218c1755e6e093a87013fd62df2d76c0a9cea8e4a206ad42ca44fe17423b83510eee6b94d946e747386c0f2c7cb46c7892e1757c5ba27a6b88592bbf099ae29a2e2014a28f8b63a570bbb9032d55f27079447570ab85feba5709f4d78a070213ff9bbefd94bda5465808e3da6c", 0x9f, 0x6, 0x0, 0x1, r6}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000018c0)="92b4baf8fea429ac377f9426bb12068c72c31e5ec70c5b267c2e2834c7b4c7f82784720c7fe452cf2796d584c4fd99db57119ffca9ceddd2280e2cb3ab7ac5b51773509317c886c1c0cea22c7524501a36fd40e962", 0x55, 0x5c, 0x0, 0x1}]) (async) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f00000019c0)={{0xfffffbff, 0x2}, 0x100, './file0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0x0) (async, rerun: 32) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) (rerun: 32) futimesat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}, {r7, r8/1000+10000}}) D0307 12:03:08.382047 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.382439 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.388169 678849 usertrap_amd64.go:212] [ 21798: 21798] Found the pattern at ip 55b880b80490:sysno 109 D0307 12:03:08.388275 678849 usertrap_amd64.go:122] [ 21798: 21798] Allocate a new trap: 0xc00046ae40 38 D0307 12:03:08.388725 678849 usertrap_amd64.go:225] [ 21798: 21798] Apply the binary patch addr 55b880b80490 trap addr 6abe0 ([184 109 0 0 0 15 5] -> [255 36 37 224 171 6 0]) D0307 12:03:08.390813 678849 usertrap_amd64.go:212] [ 21798: 21798] Found the pattern at ip 55b880b5aa30:sysno 266 D0307 12:03:08.390868 678849 usertrap_amd64.go:122] [ 21798: 21798] Allocate a new trap: 0xc00046ae40 39 D0307 12:03:08.390951 678849 usertrap_amd64.go:225] [ 21798: 21798] Apply the binary patch addr 55b880b5aa30 trap addr 6ac30 ([184 10 1 0 0 15 5] -> [255 36 37 48 172 6 0]) D0307 12:03:08.391096 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.391395 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.392898 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.393281 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.399300 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.399933 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.400668 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, ]} D0307 12:03:08.401169 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.401446 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [syzcgroup, unified, syz3, ]} D0307 12:03:08.401716 678849 client.go:400] recv [channel 0xc0002ee090] WalkResp{Status: 1, Inodes: []} D0307 12:03:08.407057 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.407348 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.416055 678849 usertrap_amd64.go:212] [ 21798: 21798] Found the pattern at ip 55b880b0cfa4:sysno 3 D0307 12:03:08.416285 678849 usertrap_amd64.go:122] [ 21798: 21798] Allocate a new trap: 0xc00046ae40 40 D0307 12:03:08.416391 678849 usertrap_amd64.go:225] [ 21798: 21798] Apply the binary patch addr 55b880b0cfa4 trap addr 6ac80 ([184 3 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 12:03:08.417080 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, ]} D0307 12:03:08.426025 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.426169 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [syzcgroup, unified, syz3, ]} D0307 12:03:08.427165 678849 client.go:400] recv [channel 0xc0002ee090] WalkResp{Status: 1, Inodes: []} D0307 12:03:08.430170 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.430671 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.430796 678849 task_exit.go:204] [ 21798: 21798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.430976 678849 task_signals.go:204] [ 21798: 21802] Signal 21798, PID: 21802, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.431086 678849 task_exit.go:204] [ 21798: 21802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.431226 678849 task_exit.go:204] [ 21798: 21798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.433026 678849 task_exit.go:204] [ 21798: 21802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.433087 678849 task_exit.go:204] [ 21798: 21802] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.433157 678849 task_signals.go:443] [ 28: 28] Discarding ignored signal 17 D0307 12:03:08.434397 678849 usertrap_amd64.go:212] [ 21801: 21801] Found the pattern at ip 55c0f09af490:sysno 109 D0307 12:03:08.434483 678849 usertrap_amd64.go:122] [ 21801: 21801] Allocate a new trap: 0xc008047110 38 D0307 12:03:08.434892 678849 usertrap_amd64.go:225] [ 21801: 21801] Apply the binary patch addr 55c0f09af490 trap addr 63be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 59 6 0]) D0307 12:03:08.434908 678849 usertrap_amd64.go:212] [ 21799: 21799] Found the pattern at ip 55c787e67490:sysno 109 D0307 12:03:08.435165 678849 usertrap_amd64.go:122] [ 21799: 21799] Allocate a new trap: 0xc007c7ab40 38 D0307 12:03:08.435075 678849 task_exit.go:204] [ 21798: 21798] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.435580 678849 usertrap_amd64.go:225] [ 21799: 21799] Apply the binary patch addr 55c787e67490 trap addr 60be0 ([184 109 0 0 0 15 5] -> [255 36 37 224 11 6 0]) 12:03:08 executing program 1: pipe2$9p(0x0, 0x80800) D0307 12:03:08.441561 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.441898 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.443370 678849 usertrap_amd64.go:212] [ 21801: 21801] Found the pattern at ip 55c0f0989a30:sysno 266 D0307 12:03:08.443435 678849 usertrap_amd64.go:122] [ 21801: 21801] Allocate a new trap: 0xc008047110 39 D0307 12:03:08.443476 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.443501 678849 usertrap_amd64.go:225] [ 21801: 21801] Apply the binary patch addr 55c0f0989a30 trap addr 63c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 60 6 0]) D0307 12:03:08.444023 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.445094 678849 usertrap_amd64.go:212] [ 21797: 21797] Found the pattern at ip 55f99a0c3e1a:sysno 230 D0307 12:03:08.445145 678849 usertrap_amd64.go:122] [ 21797: 21797] Allocate a new trap: 0xc0098d7a40 40 D0307 12:03:08.445198 678849 usertrap_amd64.go:225] [ 21797: 21797] Apply the binary patch addr 55f99a0c3e1a trap addr 68c80 ([184 230 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 12:03:08.445757 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.446250 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.449713 678849 usertrap_amd64.go:212] [ 21799: 21799] Found the pattern at ip 55c787e41a30:sysno 266 D0307 12:03:08.449770 678849 usertrap_amd64.go:122] [ 21799: 21799] Allocate a new trap: 0xc007c7ab40 39 D0307 12:03:08.449851 678849 usertrap_amd64.go:225] [ 21799: 21799] Apply the binary patch addr 55c787e41a30 trap addr 60c30 ([184 10 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0307 12:03:08.450806 678849 usertrap_amd64.go:212] [ 21797: 21797] Found the pattern at ip 55f99a050fa4:sysno 3 D0307 12:03:08.450893 678849 usertrap_amd64.go:122] [ 21797: 21797] Allocate a new trap: 0xc0098d7a40 41 D0307 12:03:08.450994 678849 usertrap_amd64.go:225] [ 21797: 21797] Apply the binary patch addr 55f99a050fa4 trap addr 68cd0 ([184 3 0 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 12:03:08.452155 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 12:03:08.452456 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 12:03:08.453677 678849 task_exit.go:204] [ 21797: 21797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.453851 678849 task_exit.go:204] [ 21797: 21797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.454427 678849 task_signals.go:204] [ 21797: 21804] Signal 21797, PID: 21804, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.454533 678849 task_exit.go:204] [ 21797: 21804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.454728 678849 task_exit.go:204] [ 21797: 21804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.454793 678849 task_exit.go:204] [ 21797: 21804] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.454948 678849 task_signals.go:204] [ 21797: 21800] Signal 21797, PID: 21800, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.455050 678849 task_exit.go:204] [ 21797: 21800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.455273 678849 task_exit.go:204] [ 21797: 21800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.455327 678849 task_exit.go:204] [ 21797: 21800] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.455489 678849 task_signals.go:204] [ 21797: 21803] Signal 21797, PID: 21803, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.455571 678849 task_exit.go:204] [ 21797: 21803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.455752 678849 task_exit.go:204] [ 21797: 21803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.455805 678849 task_exit.go:204] [ 21797: 21803] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.455978 678849 task_signals.go:204] [ 21797: 21806] Signal 21797, PID: 21806, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.456066 678849 task_exit.go:204] [ 21797: 21806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.456219 678849 task_exit.go:204] [ 21797: 21806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.456259 678849 task_exit.go:204] [ 21797: 21806] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.456595 678849 task_signals.go:204] [ 21797: 21807] Signal 21797, PID: 21807, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.456675 678849 task_signals.go:204] [ 21797: 21805] Signal 21797, PID: 21805, TID: 0, fault addr: 0x9: terminating thread group D0307 12:03:08.456801 678849 task_exit.go:204] [ 21797: 21807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.456983 678849 task_exit.go:204] [ 21797: 21807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.457024 678849 task_exit.go:204] [ 21797: 21807] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.457466 678849 task_exit.go:204] [ 21797: 21805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 12:03:08.459635 678849 task_exit.go:204] [ 21797: 21805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 12:03:08.459675 678849 task_exit.go:204] [ 21797: 21805] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 12:03:08.459751 678849 task_signals.go:443] [ 31: 31] Discarding ignored signal 17 D0307 12:03:08.461733 678849 task_exit.go:204] [ 21797: 21797] Transitioning from exit state TaskExitZombie to TaskExitDead 12:03:08 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') D0307 12:03:08.474609 678849 client.go:400] send [channel 0xc0002ee090] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 12:03:08.474989 678849 client.go:400] recv [channel 0xc0002ee090] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13507718 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678190208 Nsec:986928521 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678190213 Nsec:14924508 _:0} Mtime:{Sec:1678190213 Nsec:14924508 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} ================== WARNING: DATA RACE Write at 0x00c0008465d4 by goroutine 721668: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocessPool).fetchAvailable() pkg/sentry/platform/systrap/subprocess_pool.go:74 +0x248 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess() pkg/sentry/platform/systrap/subprocess.go:249 +0x64 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*Systrap).NewAddressSpace() pkg/sentry/platform/systrap/systrap.go:364 +0x6e gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).NewAddressSpace() :1 +0x77 gvisor.dev/gvisor/pkg/sentry/mm.(*MemoryManager).Activate() pkg/sentry/mm/address_space.go:86 +0x13a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Activate() pkg/sentry/kernel/task_usermem.go:39 +0x59 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:70 +0x2e4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Previous read at 0x00c0008465d4 by goroutine 721521: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocess).unregisterContext() pkg/sentry/platform/systrap/subprocess.go:978 +0xd7 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*context).Release() pkg/sentry/platform/systrap/systrap.go:286 +0x95 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:101 +0x51a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 721668 (running) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 721521 (finished) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 ================== W0307 12:03:08.655671 678821 sandbox.go:1003] Wait RPC to container "ci-gvisor-systrap-1-race-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. W0307 12:03:08.655722 679026 util.go:64] FATAL ERROR: waiting on pid 8: waiting on PID 8 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 8: waiting on PID 8 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF W0307 12:03:08.656168 679026 main.go:267] Failure to execute command, err: 1 D0307 12:03:08.672288 1 connection.go:127] sock read failed, closing connection: EOF I0307 12:03:08.673268 1 gofer.go:333] All lisafs servers exited. I0307 12:03:08.673364 1 main.go:258] Exiting with status: 0 D0307 12:03:08.682652 678821 container.go:736] Destroy container, cid: ci-gvisor-systrap-1-race-0 D0307 12:03:08.682801 678821 container.go:976] Destroying container, cid: ci-gvisor-systrap-1-race-0 D0307 12:03:08.682846 678821 sandbox.go:1290] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-0 D0307 12:03:08.682884 678821 sandbox.go:1045] Destroying sandbox "ci-gvisor-systrap-1-race-0" D0307 12:03:08.683021 678821 container.go:990] Killing gofer for container, cid: ci-gvisor-systrap-1-race-0, PID: 678846 I0307 12:03:08.701486 678821 main.go:258] Exiting with status: 16896 VM DIAGNOSIS: I0307 12:03:08.660698 724916 main.go:222] *************************** I0307 12:03:08.660862 724916 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0307 12:03:08.660993 724916 main.go:224] Version 0.0.0 I0307 12:03:08.661034 724916 main.go:225] GOOS: linux I0307 12:03:08.661082 724916 main.go:226] GOARCH: amd64 I0307 12:03:08.661146 724916 main.go:227] PID: 724916 I0307 12:03:08.661215 724916 main.go:228] UID: 0, GID: 0 I0307 12:03:08.661261 724916 main.go:229] Configuration: I0307 12:03:08.661315 724916 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0307 12:03:08.661392 724916 main.go:231] Platform: systrap I0307 12:03:08.661447 724916 main.go:232] FileAccess: shared I0307 12:03:08.661508 724916 main.go:233] Directfs: false I0307 12:03:08.661563 724916 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0307 12:03:08.661610 724916 main.go:236] Network: sandbox, logging: false I0307 12:03:08.661656 724916 main.go:237] Strace: false, max size: 1024, syscalls: I0307 12:03:08.661702 724916 main.go:238] IOURING: false I0307 12:03:08.661743 724916 main.go:239] Debug: true I0307 12:03:08.661798 724916 main.go:240] Systemd: false I0307 12:03:08.661840 724916 main.go:241] *************************** W0307 12:03:08.661915 724916 main.go:246] Block the TERM signal. This is only safe in tests! D0307 12:03:08.662061 724916 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0307 12:03:08.667853 724916 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000a5bc1'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000a5bc1'], PID: %!d(MISSING) I0307 12:03:08.667965 724916 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0307 12:03:08.667997 724916 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0307 12:03:08.668044 724916 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-0" W0307 12:03:08.668173 724916 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 678849: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 678849: connection refused W0307 12:03:08.668373 724916 main.go:267] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0307 12:03:08.660698 724916 main.go:222] *************************** I0307 12:03:08.660862 724916 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0307 12:03:08.660993 724916 main.go:224] Version 0.0.0 I0307 12:03:08.661034 724916 main.go:225] GOOS: linux I0307 12:03:08.661082 724916 main.go:226] GOARCH: amd64 I0307 12:03:08.661146 724916 main.go:227] PID: 724916 I0307 12:03:08.661215 724916 main.go:228] UID: 0, GID: 0 I0307 12:03:08.661261 724916 main.go:229] Configuration: I0307 12:03:08.661315 724916 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0307 12:03:08.661392 724916 main.go:231] Platform: systrap I0307 12:03:08.661447 724916 main.go:232] FileAccess: shared I0307 12:03:08.661508 724916 main.go:233] Directfs: false I0307 12:03:08.661563 724916 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0307 12:03:08.661610 724916 main.go:236] Network: sandbox, logging: false I0307 12:03:08.661656 724916 main.go:237] Strace: false, max size: 1024, syscalls: I0307 12:03:08.661702 724916 main.go:238] IOURING: false I0307 12:03:08.661743 724916 main.go:239] Debug: true I0307 12:03:08.661798 724916 main.go:240] Systemd: false I0307 12:03:08.661840 724916 main.go:241] *************************** W0307 12:03:08.661915 724916 main.go:246] Block the TERM signal. This is only safe in tests! D0307 12:03:08.662061 724916 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0307 12:03:08.667853 724916 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000a5bc1'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000a5bc1'], PID: %!d(MISSING) I0307 12:03:08.667965 724916 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0307 12:03:08.667997 724916 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0307 12:03:08.668044 724916 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-0" W0307 12:03:08.668173 724916 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 678849: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 678849: connection refused W0307 12:03:08.668373 724916 main.go:267] Failure to execute command, err: 1 [129211.729686] exe[440341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c443cd506 cs:33 sp:7f5c74a9a8e8 ax:ffffffffff600000 si:7f5c74a9ae08 di:ffffffffff600000 [130759.331849] exe[464359] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [131169.830852] exe[999765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce3cace506 cs:33 sp:7f6ca67068e8 ax:ffffffffff600000 si:7f6ca6706e08 di:ffffffffff600000 [131179.356353] exe[738502] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [131182.501955] exe[115442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0f88e8 ax:ffffffffff600000 si:7f94ff0f8e08 di:ffffffffff600000 [131182.687276] exe[90979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.726003] exe[90979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.759715] exe[112497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.791772] exe[112497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.852845] exe[112497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.886526] exe[101639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.917394] exe[102655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [131182.952184] exe[91027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55883e73b506 cs:33 sp:7f94ff0d78e8 ax:ffffffffff600000 si:7f94ff0d7e08 di:ffffffffff600000 [132025.731233] warn_bad_vsyscall: 46 callbacks suppressed [132025.731236] exe[252649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe5883d506 cs:33 sp:7f8e31d408e8 ax:ffffffffff600000 si:7f8e31d40e08 di:ffffffffff600000 [132025.912668] exe[77769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe5883d506 cs:33 sp:7f8e31d408e8 ax:ffffffffff600000 si:7f8e31d40e08 di:ffffffffff600000 [132026.061496] exe[77769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe5883d506 cs:33 sp:7f8e31d408e8 ax:ffffffffff600000 si:7f8e31d40e08 di:ffffffffff600000 [132026.179435] exe[227026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe5883d506 cs:33 sp:7f8e31d408e8 ax:ffffffffff600000 si:7f8e31d40e08 di:ffffffffff600000 [132323.330337] exe[282581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff449c8506 cs:33 sp:7fe6503498e8 ax:ffffffffff600000 si:7fe650349e08 di:ffffffffff600000 [132323.567292] exe[351423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff449c8506 cs:33 sp:7fe6503498e8 ax:ffffffffff600000 si:7fe650349e08 di:ffffffffff600000 [132323.800621] exe[325549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff449c8506 cs:33 sp:7fe6503498e8 ax:ffffffffff600000 si:7fe650349e08 di:ffffffffff600000 [132323.928337] exe[311596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff449c8506 cs:33 sp:7fe6503498e8 ax:ffffffffff600000 si:7fe650349e08 di:ffffffffff600000 [132359.789789] exe[117806] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [132749.207041] exe[198735] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [132991.386026] exe[122269] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [133165.380647] exe[656535] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [133331.377220] exe[285155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556267bc3506 cs:33 sp:7f04d206c8e8 ax:ffffffffff600000 si:7f04d206ce08 di:ffffffffff600000 [134477.593667] exe[311677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff449c8506 cs:33 sp:7fe6503498e8 ax:ffffffffff600000 si:7fe650349e08 di:ffffffffff600000 [134483.222497] exe[116770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56442a4d5378 cs:33 sp:7fa37dbecf90 ax:7fa37dbed020 si:ffffffffff600000 di:56442a59f263 [134496.399809] exe[891058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558647f4f378 cs:33 sp:7ea5f8f3ff90 ax:7ea5f8f40020 si:ffffffffff600000 di:558648019263 [134518.429370] exe[126098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577507e2378 cs:33 sp:7f81a5b0af90 ax:7f81a5b0b020 si:ffffffffff600000 di:5577508ac263 [134522.056734] exe[739961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56442c130378 cs:33 sp:7f8dbd5baf90 ax:7f8dbd5bb020 si:ffffffffff600000 di:56442c1fa263 [134528.521234] exe[810159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560936667378 cs:33 sp:7f1fed6d3f90 ax:7f1fed6d4020 si:ffffffffff600000 di:560936731263 [134616.585176] exe[258906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56262f318378 cs:33 sp:7fd859860f90 ax:7fd859861020 si:ffffffffff600000 di:56262f3e2263 [134616.975258] exe[282898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56262f318378 cs:33 sp:7fd859860f90 ax:7fd859861020 si:ffffffffff600000 di:56262f3e2263 [134617.375550] exe[257340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56262f318378 cs:33 sp:7fd859860f90 ax:7fd859861020 si:ffffffffff600000 di:56262f3e2263 [134617.788431] exe[481003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56262f318378 cs:33 sp:7fd859860f90 ax:7fd859861020 si:ffffffffff600000 di:56262f3e2263 [134790.279570] exe[819005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555588745378 cs:33 sp:7f4c7dea7f90 ax:7f4c7dea8020 si:ffffffffff600000 di:55558880f263 [134873.303750] exe[473833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642a217d378 cs:33 sp:7f7aebd5df90 ax:7f7aebd5e020 si:ffffffffff600000 di:5642a2247263 [134943.358892] exe[752934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e6dde1378 cs:33 sp:7fb9b2939f90 ax:7fb9b293a020 si:ffffffffff600000 di:555e6deab263 [135016.187528] exe[27856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b095bbc378 cs:33 sp:7ebd8b627f90 ax:7ebd8b628020 si:ffffffffff600000 di:55b095c86263 [135175.832270] exe[959006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567beb07378 cs:33 sp:7f0ba1164f90 ax:7f0ba1165020 si:ffffffffff600000 di:5567bebd1263 [135189.992583] exe[70803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c493d6a378 cs:33 sp:7eeb99db8f90 ax:7eeb99db9020 si:ffffffffff600000 di:55c493e34263 [135205.264915] exe[438516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee824be378 cs:33 sp:7ff9f5e37f90 ax:7ff9f5e38020 si:ffffffffff600000 di:55ee82588263 [135239.395597] exe[82883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd8859378 cs:33 sp:7ed6fe384f90 ax:7ed6fe385020 si:ffffffffff600000 di:55fcd8923263 [135416.268193] exe[381306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb21ebb378 cs:33 sp:7fb2cca7ef90 ax:7fb2cca7f020 si:ffffffffff600000 di:55fb21f85263 [135512.810369] exe[566236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563871e96378 cs:33 sp:7f5166cf9f90 ax:7f5166cfa020 si:ffffffffff600000 di:563871f60263 [137976.094241] exe[583702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca376e506 cs:33 sp:7eff47d4c8e8 ax:ffffffffff600000 si:7eff47d4ce08 di:ffffffffff600000 [137976.644247] exe[325335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca376e506 cs:33 sp:7eff47d2b8e8 ax:ffffffffff600000 si:7eff47d2be08 di:ffffffffff600000 [137977.187050] exe[721531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca376e506 cs:33 sp:7eff47d4c8e8 ax:ffffffffff600000 si:7eff47d4ce08 di:ffffffffff600000 [137977.193247] exe[583850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ca376e506 cs:33 sp:7eff47d2b8e8 ax:ffffffffff600000 si:7eff47d2be08 di:ffffffffff600000 [142275.065952] exe[367455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3077e3506 cs:33 sp:7f0809e9f8e8 ax:ffffffffff600000 si:7f0809e9fe08 di:ffffffffff600000 [142275.368224] exe[729136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3077e3506 cs:33 sp:7f0809e9f8e8 ax:ffffffffff600000 si:7f0809e9fe08 di:ffffffffff600000 [142275.430136] exe[649316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3077e3506 cs:33 sp:7f0809e9f8e8 ax:ffffffffff600000 si:7f0809e9fe08 di:ffffffffff600000 [142275.828710] exe[383963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3077e3506 cs:33 sp:7f0809e9f8e8 ax:ffffffffff600000 si:7f0809e9fe08 di:ffffffffff600000 [143479.201360] exe[47808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dffb11c506 cs:33 sp:7eb2dfc278e8 ax:ffffffffff600000 si:7eb2dfc27e08 di:ffffffffff600000 [143479.372549] exe[47862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dffb11c506 cs:33 sp:7eb2dfc278e8 ax:ffffffffff600000 si:7eb2dfc27e08 di:ffffffffff600000 [143479.598261] exe[47938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dffb11c506 cs:33 sp:7eb2df7fe8e8 ax:ffffffffff600000 si:7eb2df7fee08 di:ffffffffff600000 [143479.598283] exe[47930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dffb11c506 cs:33 sp:7eb2dfc278e8 ax:ffffffffff600000 si:7eb2dfc27e08 di:ffffffffff600000 [143525.930893] exe[61918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143526.099641] exe[61971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143526.271139] exe[62019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143526.463101] exe[62077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143526.672894] exe[62141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143526.847462] exe[62185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143527.003185] exe[62234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143527.165271] exe[62281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143527.398626] exe[62328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143527.580517] exe[62393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143530.986142] warn_bad_vsyscall: 21 callbacks suppressed [143530.986146] exe[63301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143793.049794] exe[129572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143793.780068] exe[129761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773ddd8e8 ax:ffffffffff600000 si:7ee773ddde08 di:ffffffffff600000 [143793.962297] exe[129807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773dfe8e8 ax:ffffffffff600000 si:7ee773dfee08 di:ffffffffff600000 [143794.011299] exe[129821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee1809506 cs:33 sp:7ee773ddd8e8 ax:ffffffffff600000 si:7ee773ddde08 di:ffffffffff600000 [146861.750501] exe[354806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f74c7506 cs:33 sp:7fa8c97378e8 ax:ffffffffff600000 si:7fa8c9737e08 di:ffffffffff600000 [146862.853446] exe[247330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f74c7506 cs:33 sp:7fa8c97398e8 ax:ffffffffff600000 si:7fa8c9739e08 di:ffffffffff600000 [146863.931912] exe[804590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f74c7506 cs:33 sp:7fa8c975a8e8 ax:ffffffffff600000 si:7fa8c975ae08 di:ffffffffff600000 [146863.965005] exe[797877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f74c7506 cs:33 sp:7fa8c96f58e8 ax:ffffffffff600000 si:7fa8c96f5e08 di:ffffffffff600000 [147676.913212] exe[977791] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [147677.495422] exe[977791] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [147678.078265] exe[990643] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [150262.148344] exe[662156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4e051506 cs:33 sp:7f1fcb7dcf88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [150262.956359] exe[662189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4e051506 cs:33 sp:7f1fcb7dcf88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [150263.156585] exe[674965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4e051506 cs:33 sp:7f1fcb7dcf88 ax:ffffffffff600000 si:200002c0 di:ffffffffff600000 [150403.282645] exe[773023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d284d4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020400 [150403.847530] exe[612608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d284d4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020400 [150404.059066] exe[618547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d284d4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20020400 [151977.825061] exe[517083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560acc046506 cs:33 sp:7f987d6728e8 ax:ffffffffff600000 si:7f987d672e08 di:ffffffffff600000 [152035.382609] exe[556040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559b4526506 cs:33 sp:7f946663f8e8 ax:ffffffffff600000 si:7f946663fe08 di:ffffffffff600000 [152158.348785] exe[190058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634945dc506 cs:33 sp:7f6766ab88e8 ax:ffffffffff600000 si:7f6766ab8e08 di:ffffffffff600000 [152179.399015] exe[245300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ecdffb506 cs:33 sp:7fe2274cf8e8 ax:ffffffffff600000 si:7fe2274cfe08 di:ffffffffff600000 [152183.516356] exe[246802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570547b2506 cs:33 sp:7f581808b8e8 ax:ffffffffff600000 si:7f581808be08 di:ffffffffff600000 [152187.189796] exe[248198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567934ad506 cs:33 sp:7ee55b8498e8 ax:ffffffffff600000 si:7ee55b849e08 di:ffffffffff600000 [152191.230814] exe[249667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b307c3b506 cs:33 sp:7f745a0f08e8 ax:ffffffffff600000 si:7f745a0f0e08 di:ffffffffff600000 [152191.471831] exe[249822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b307c3b506 cs:33 sp:7f745a0f08e8 ax:ffffffffff600000 si:7f745a0f0e08 di:ffffffffff600000 [152365.300911] exe[242919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8e969506 cs:33 sp:7f2b184978e8 ax:ffffffffff600000 si:7f2b18497e08 di:ffffffffff600000 [152366.692158] exe[296273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fccc8ae506 cs:33 sp:7eff91bea8e8 ax:ffffffffff600000 si:7eff91beae08 di:ffffffffff600000 [152382.178920] exe[302020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621e830c506 cs:33 sp:7ee5410278e8 ax:ffffffffff600000 si:7ee541027e08 di:ffffffffff600000 [152399.651317] exe[304739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bdbda3506 cs:33 sp:7f18dc6d28e8 ax:ffffffffff600000 si:7f18dc6d2e08 di:ffffffffff600000 [152419.295654] exe[313063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569f9cc5506 cs:33 sp:7ec5f53418e8 ax:ffffffffff600000 si:7ec5f5341e08 di:ffffffffff600000 [152435.216648] exe[318613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641d1a4e506 cs:33 sp:7f9d075638e8 ax:ffffffffff600000 si:7f9d07563e08 di:ffffffffff600000 [152445.648236] exe[317995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55730b811506 cs:33 sp:7fabec8228e8 ax:ffffffffff600000 si:7fabec822e08 di:ffffffffff600000 [152527.393103] exe[341739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8abc06506 cs:33 sp:7eed5bbe08e8 ax:ffffffffff600000 si:7eed5bbe0e08 di:ffffffffff600000 [152808.675492] exe[242445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c4b03506 cs:33 sp:7fbcc49d88e8 ax:ffffffffff600000 si:7fbcc49d8e08 di:ffffffffff600000 [152808.948165] exe[296993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c4b03506 cs:33 sp:7fbcc49548e8 ax:ffffffffff600000 si:7fbcc4954e08 di:ffffffffff600000 [152809.105850] exe[334367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c4b03506 cs:33 sp:7fbcc49758e8 ax:ffffffffff600000 si:7fbcc4975e08 di:ffffffffff600000 [153392.597917] exe[402395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561cb0e73506 cs:33 sp:7f85a0d8a8e8 ax:ffffffffff600000 si:7f85a0d8ae08 di:ffffffffff600000 [155587.591387] exe[705288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628034ab506 cs:33 sp:7fca237518e8 ax:ffffffffff600000 si:7fca23751e08 di:ffffffffff600000 [155588.210805] exe[407436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628034ab506 cs:33 sp:7fca237518e8 ax:ffffffffff600000 si:7fca23751e08 di:ffffffffff600000 [155588.705475] exe[364478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628034ab506 cs:33 sp:7fca237518e8 ax:ffffffffff600000 si:7fca23751e08 di:ffffffffff600000 [156045.355077] exe[958114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d0c86101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [156045.749431] exe[957825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d0c86101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [156046.162069] exe[957743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d0c86101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [156046.163705] exe[957688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d0c86101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [157195.112272] exe[212038] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [157199.337185] exe[212100] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [157201.225515] exe[212100] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [160628.280630] exe[424851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56466a648506 cs:33 sp:7fd30c7a4f88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [160628.478274] exe[407355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56466a648506 cs:33 sp:7fd30c7a4f88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [160629.005440] exe[657571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56466a648506 cs:33 sp:7fd30c741f88 ax:ffffffffff600000 si:20002d80 di:ffffffffff600000 [161649.855534] exe[67547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26790f378 cs:33 sp:7f31b23d3f90 ax:7f31b23d4020 si:ffffffffff600000 di:55f2679d9263 [161650.321019] exe[61342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26790f378 cs:33 sp:7f31b23d3f90 ax:7f31b23d4020 si:ffffffffff600000 di:55f2679d9263 [161650.718921] exe[59779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26790f378 cs:33 sp:7f31b23d3f90 ax:7f31b23d4020 si:ffffffffff600000 di:55f2679d9263 [163027.012697] exe[405373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558415e47506 cs:33 sp:7ea9371c98e8 ax:ffffffffff600000 si:7ea9371c9e08 di:ffffffffff600000 [163027.121630] exe[405421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558415e47506 cs:33 sp:7ea9371c98e8 ax:ffffffffff600000 si:7ea9371c9e08 di:ffffffffff600000 [163027.226634] exe[405473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558415e47506 cs:33 sp:7ea9371c98e8 ax:ffffffffff600000 si:7ea9371c9e08 di:ffffffffff600000 [163027.276859] exe[405473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558415e47506 cs:33 sp:7ea9371c98e8 ax:ffffffffff600000 si:7ea9371c9e08 di:ffffffffff600000 [163621.529717] exe[59394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [163621.831899] exe[58784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [163622.210995] exe[235799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [163622.211319] exe[304251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd128e8 ax:ffffffffff600000 si:7fcb3bd12e08 di:ffffffffff600000 [163826.437650] exe[28578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [163827.340584] exe[75051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [163828.214649] exe[36681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e077982506 cs:33 sp:7fcb3bd338e8 ax:ffffffffff600000 si:7fcb3bd33e08 di:ffffffffff600000 [164171.076086] exe[614318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191d3ab506 cs:33 sp:7ef3f73d68e8 ax:ffffffffff600000 si:7ef3f73d6e08 di:ffffffffff600000 [164171.261181] exe[614357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191d3ab506 cs:33 sp:7ef3f73d68e8 ax:ffffffffff600000 si:7ef3f73d6e08 di:ffffffffff600000 [164171.326288] exe[614357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191d3ab506 cs:33 sp:7ef3f73d68e8 ax:ffffffffff600000 si:7ef3f73d6e08 di:ffffffffff600000 [164171.566112] exe[614427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191d3ab506 cs:33 sp:7ef3f73b58e8 ax:ffffffffff600000 si:7ef3f73b5e08 di:ffffffffff600000 [164217.292996] exe[546939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf7208e8 ax:ffffffffff600000 si:7f93cf720e08 di:ffffffffff600000 [164217.594402] exe[364647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.630927] exe[547091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.663218] exe[547091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.696294] exe[547091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.729167] exe[547091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.762046] exe[547091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.793478] exe[364599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.827745] exe[364599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164217.861704] exe[364599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562017bc0506 cs:33 sp:7f93cf6ff8e8 ax:ffffffffff600000 si:7f93cf6ffe08 di:ffffffffff600000 [164287.024808] warn_bad_vsyscall: 44 callbacks suppressed [164287.024812] exe[335247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26795e506 cs:33 sp:7f31b23d38e8 ax:ffffffffff600000 si:7f31b23d3e08 di:ffffffffff600000 [164287.518072] exe[521263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26795e506 cs:33 sp:7f31b23d38e8 ax:ffffffffff600000 si:7f31b23d3e08 di:ffffffffff600000 [164287.759425] exe[333582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f26795e506 cs:33 sp:7f31b23b28e8 ax:ffffffffff600000 si:7f31b23b2e08 di:ffffffffff600000 [164314.582683] exe[636566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c0746378 cs:33 sp:7ee44ac4bf90 ax:7ee44ac4c020 si:ffffffffff600000 di:5576c0810263 [164315.100634] exe[636626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c0746378 cs:33 sp:7ee44ac4bf90 ax:7ee44ac4c020 si:ffffffffff600000 di:5576c0810263 [164315.171342] exe[636636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c0746378 cs:33 sp:7ee44a7fef90 ax:7ee44a7ff020 si:ffffffffff600000 di:5576c0810263 [164315.350725] exe[636658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c0746378 cs:33 sp:7ee44ac4bf90 ax:7ee44ac4c020 si:ffffffffff600000 di:5576c0810263 [167092.545643] exe[22768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632d91ba506 cs:33 sp:7f61b2c868e8 ax:ffffffffff600000 si:7f61b2c86e08 di:ffffffffff600000 [167092.875008] exe[812290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632d91ba506 cs:33 sp:7f61b2c868e8 ax:ffffffffff600000 si:7f61b2c86e08 di:ffffffffff600000 [167093.226567] exe[717467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632d91ba506 cs:33 sp:7f61b2c868e8 ax:ffffffffff600000 si:7f61b2c86e08 di:ffffffffff600000 [167318.988100] exe[113090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d6838378 cs:33 sp:7f33efbbcf90 ax:7f33efbbd020 si:ffffffffff600000 di:55f8d6902263 [167319.870883] exe[159570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d6838378 cs:33 sp:7f33efbbcf90 ax:7f33efbbd020 si:ffffffffff600000 di:55f8d6902263 [167320.099264] exe[172027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d6838378 cs:33 sp:7f33efbbcf90 ax:7f33efbbd020 si:ffffffffff600000 di:55f8d6902263 [168926.962359] exe[184483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef9f9a506 cs:33 sp:7febf31fe8e8 ax:ffffffffff600000 si:7febf31fee08 di:ffffffffff600000 [168927.140279] exe[197383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef9f9a506 cs:33 sp:7febf31dd8e8 ax:ffffffffff600000 si:7febf31dde08 di:ffffffffff600000 [168927.372904] exe[25744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef9f9a506 cs:33 sp:7febf31fe8e8 ax:ffffffffff600000 si:7febf31fee08 di:ffffffffff600000 [168934.872660] exe[186415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168935.102929] exe[847561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168935.431840] exe[847362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168935.830167] exe[32502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168936.121214] exe[847376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168936.487929] exe[847624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168936.827972] exe[847362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168937.163416] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168937.375384] exe[847533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168937.748197] exe[60455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56022fa7a506 cs:33 sp:7fc52c3098e8 ax:ffffffffff600000 si:7fc52c309e08 di:ffffffffff600000 [168944.369532] warn_bad_vsyscall: 4 callbacks suppressed [168944.369535] exe[60307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168944.699789] exe[847540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168944.757155] exe[197387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c48f8e8 ax:ffffffffff600000 si:7f2e0c48fe08 di:ffffffffff600000 [168945.152604] exe[847629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168945.483265] exe[849938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168945.778156] exe[186190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4b08e8 ax:ffffffffff600000 si:7f2e0c4b0e08 di:ffffffffff600000 [168946.102740] exe[847613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168946.236347] exe[60246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4b08e8 ax:ffffffffff600000 si:7f2e0c4b0e08 di:ffffffffff600000 [168946.449801] exe[60424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168946.615958] exe[186225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.375106] warn_bad_vsyscall: 76 callbacks suppressed [168949.375109] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.416145] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.453297] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.485738] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.517349] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.558267] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.596536] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.629400] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.660988] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.691957] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [169036.927775] warn_bad_vsyscall: 35 callbacks suppressed [169036.927778] exe[338789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169037.269917] exe[338914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194def90 ax:7fd0194df020 si:ffffffffff600000 di:5649c221d263 [169038.044881] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.073755] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.096842] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.123016] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.145543] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.178658] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.221852] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.270254] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169227.686320] warn_bad_vsyscall: 25 callbacks suppressed [169227.686323] exe[453441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cce300b506 cs:33 sp:7fc1672db8e8 ax:ffffffffff600000 si:7fc1672dbe08 di:ffffffffff600000 [169228.313757] exe[198846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cce300b506 cs:33 sp:7fc1672db8e8 ax:ffffffffff600000 si:7fc1672dbe08 di:ffffffffff600000 [169253.270823] exe[290067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55680be92506 cs:33 sp:7f96715e28e8 ax:ffffffffff600000 si:7f96715e2e08 di:ffffffffff600000 [169257.401656] exe[327999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd51f95506 cs:33 sp:7f32fe2308e8 ax:ffffffffff600000 si:7f32fe230e08 di:ffffffffff600000 [169263.081680] exe[255671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600c8167506 cs:33 sp:7f7e96bcf8e8 ax:ffffffffff600000 si:7f7e96bcfe08 di:ffffffffff600000 [169275.647588] exe[979345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56413cb13506 cs:33 sp:7f5669d748e8 ax:ffffffffff600000 si:7f5669d74e08 di:ffffffffff600000 [169284.382482] exe[477337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589296f6506 cs:33 sp:7fbf4be688e8 ax:ffffffffff600000 si:7fbf4be68e08 di:ffffffffff600000 [169285.772045] exe[338814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e2bd06506 cs:33 sp:7f3ef1d2e8e8 ax:ffffffffff600000 si:7f3ef1d2ee08 di:ffffffffff600000 [169314.731484] exe[491245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559320d66506 cs:33 sp:7f9fe3b4d8e8 ax:ffffffffff600000 si:7f9fe3b4de08 di:ffffffffff600000 [169320.281714] exe[554205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ecafc3506 cs:33 sp:7eeb17a238e8 ax:ffffffffff600000 si:7eeb17a23e08 di:ffffffffff600000 [169330.725311] exe[452551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f46454506 cs:33 sp:7f95b2de18e8 ax:ffffffffff600000 si:7f95b2de1e08 di:ffffffffff600000 [169367.206643] exe[432445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e5744506 cs:33 sp:7f536faeb8e8 ax:ffffffffff600000 si:7f536faebe08 di:ffffffffff600000 [169406.643519] exe[572037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f03a3506 cs:33 sp:7ef6273468e8 ax:ffffffffff600000 si:7ef627346e08 di:ffffffffff600000 [170044.298945] exe[510928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bfe8e8 ax:ffffffffff600000 si:7f9ee9bfee08 di:ffffffffff600000 [170044.704137] exe[92486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.727335] exe[92486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.752961] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.780606] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.809611] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.831736] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.857228] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.883372] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.909237] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170493.292225] warn_bad_vsyscall: 57 callbacks suppressed [170493.292230] exe[816628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c38a24a506 cs:33 sp:7ede2c3f18e8 ax:ffffffffff600000 si:7ede2c3f1e08 di:ffffffffff600000 [171041.713772] exe[393822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171042.093675] exe[470080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171042.958482] exe[765112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171918.815274] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171919.575942] exe[908891] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171920.148749] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171920.807187] exe[999905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171921.606102] exe[992736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171922.237220] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171922.930467] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [172144.719154] exe[1881] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172145.372524] exe[4068] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172145.905896] exe[5454] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172146.527420] exe[28148] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172468.053386] exe[261110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.268980] exe[273562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.469811] exe[261137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.629216] exe[274835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [173040.816649] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173041.317059] exe[227279] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173041.769832] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173042.245073] exe[250517] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173043.014001] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173043.530728] exe[250517] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173044.047524] exe[240963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173131.612071] exe[343463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173131.785866] exe[416466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173131.800520] exe[335845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.215188] exe[334984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173132.285987] exe[338997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.387754] exe[358692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173132.470053] exe[336609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.484221] exe[448335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6bbc0d506 cs:33 sp:7fc54b6c48e8 ax:ffffffffff600000 si:7fc54b6c4e08 di:ffffffffff600000 [173132.512239] exe[427139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606af7f0506 cs:33 sp:7f3ab3b538e8 ax:ffffffffff600000 si:7f3ab3b53e08 di:ffffffffff600000 [173132.678853] exe[427139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6bbc0d506 cs:33 sp:7fc54b6c48e8 ax:ffffffffff600000 si:7fc54b6c4e08 di:ffffffffff600000 [173628.024742] warn_bad_vsyscall: 3 callbacks suppressed [173628.024745] exe[355956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ac7e40378 cs:33 sp:7f16bb861f90 ax:7f16bb862020 si:ffffffffff600000 di:559ac7f0a263 [174840.681003] exe[708897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174841.246327] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174841.825158] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174842.383946] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174976.929891] exe[682467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1feedd506 cs:33 sp:7f88a30a88e8 ax:ffffffffff600000 si:7f88a30a8e08 di:ffffffffff600000 [175857.213999] exe[314060] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175858.287508] exe[316729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175859.125825] exe[879442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175860.043996] exe[314060] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175861.255976] exe[879442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175862.193266] exe[940673] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175863.268432] exe[316729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175863.835149] exe[157540] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [176175.080745] exe[421036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176175.739393] exe[421036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176175.954523] exe[420801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176176.353498] exe[420752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [177333.313263] exe[229084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177333.546932] exe[208712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177334.147017] exe[481732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177334.429691] exe[208774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177730.200848] exe[311330] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [177840.436307] exe[652143] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [177843.844718] exe[646796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c871dba506 cs:33 sp:7fd89b99e8e8 ax:ffffffffff600000 si:7fd89b99ee08 di:ffffffffff600000 [178339.863828] exe[409685] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [178409.752058] exe[552921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178410.277201] exe[617654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178410.594467] exe[548431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178411.079829] exe[552576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178935.476197] exe[518476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558860d6a506 cs:33 sp:7f0a0cb488e8 ax:ffffffffff600000 si:7f0a0cb48e08 di:ffffffffff600000 [179151.464014] exe[94841] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [179371.853931] exe[964090] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [179849.661067] exe[114599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c6c679506 cs:33 sp:7f6b2988b8e8 ax:ffffffffff600000 si:7f6b2988be08 di:ffffffffff600000 [179995.237892] exe[806612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e63f90 ax:7f5eb4e64020 si:ffffffffff600000 di:5572ae148263 [179995.602010] exe[921478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e21f90 ax:7f5eb4e22020 si:ffffffffff600000 di:5572ae148263 [179995.931983] exe[812582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e63f90 ax:7f5eb4e64020 si:ffffffffff600000 di:5572ae148263 [180662.041519] exe[340469] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [181906.241923] exe[499669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [181906.548516] exe[506783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [181906.570079] exe[413189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e338e8 ax:ffffffffff600000 si:7f6937e33e08 di:ffffffffff600000 [181907.037805] exe[420831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [182498.091758] exe[111615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182498.597514] exe[418026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182499.262906] exe[490058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182499.627831] exe[451356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182842.403731] exe[440192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d774378 cs:33 sp:7feea9262f90 ax:7feea9263020 si:ffffffffff600000 di:55557d83e263 [183451.140556] exe[981425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556785f4f506 cs:33 sp:7f0e2b1b98e8 ax:ffffffffff600000 si:7f0e2b1b9e08 di:ffffffffff600000 [184885.805304] exe[365993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c80f88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184885.929010] exe[366036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c5ff88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184886.110827] exe[366064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c80f88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184886.112399] exe[366081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c5ff88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [185671.103121] exe[569032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.376301] exe[569112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.480497] exe[569112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.779139] exe[569233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ec48e8 ax:ffffffffff600000 si:7ec670ec4e08 di:ffffffffff600000 [185672.858407] exe[569516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.078294] exe[569580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.320555] exe[569643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.551148] exe[569710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.712189] exe[569748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.880560] exe[569788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [187299.955550] warn_bad_vsyscall: 9 callbacks suppressed [187299.955553] exe[945970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [187300.650467] exe[904172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [187300.977581] exe[903832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [188918.887779] exe[138082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [188919.253834] exe[207828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [188919.293441] exe[207828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9968e8 ax:ffffffffff600000 si:7fc8fa996e08 di:ffffffffff600000 [188919.563498] exe[126800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [190173.934429] exe[237234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4fbd8e8 ax:ffffffffff600000 si:7f5ea4fbde08 di:ffffffffff600000 [190174.927934] exe[260781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4fde8e8 ax:ffffffffff600000 si:7f5ea4fdee08 di:ffffffffff600000 [190176.308406] exe[260594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4f9c8e8 ax:ffffffffff600000 si:7f5ea4f9ce08 di:ffffffffff600000 [190799.753960] exe[646283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [190800.469206] exe[625808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [190801.180013] exe[607488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078664c8e8 ax:ffffffffff600000 si:7f078664ce08 di:ffffffffff600000 [190801.191491] exe[616472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [194657.536988] exe[441514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194657.866039] exe[441600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194657.883600] exe[441611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119cc1f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194658.201967] exe[441677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [198344.942151] exe[976003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198345.999370] exe[37673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198347.231724] exe[997743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198347.231841] exe[997787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6858e8 ax:ffffffffff600000 si:7f325e685e08 di:ffffffffff600000 [198726.048900] exe[99916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.132499] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.154347] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.178194] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.201505] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.222624] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.244387] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.268009] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.290416] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.318678] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.414983] warn_bad_vsyscall: 57 callbacks suppressed [198741.414986] exe[102569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.496672] exe[102575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.572587] exe[102584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.670080] exe[102594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.756074] exe[102603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.846796] exe[102610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.930766] exe[102620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.002050] exe[102628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.075560] exe[102636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.172833] exe[102651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [200726.590503] warn_bad_vsyscall: 3 callbacks suppressed [200726.590506] exe[963990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [200726.746279] exe[214221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [200726.913309] exe[967671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [204570.334146] exe[142478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a55142e506 cs:33 sp:7ebae5e9c8e8 ax:ffffffffff600000 si:7ebae5e9ce08 di:ffffffffff600000 [205676.166119] exe[408851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f88e32d378 cs:33 sp:7f72736e9f90 ax:7f72736ea020 si:ffffffffff600000 di:55f88e3f7263 [205682.569708] exe[433504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754d0a4378 cs:33 sp:7f86413fdf90 ax:7f86413fe020 si:ffffffffff600000 di:55754d16e263 [205693.378069] exe[431448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcb42b378 cs:33 sp:7f28d1d32f90 ax:7f28d1d33020 si:ffffffffff600000 di:555bcb4f5263 [205750.027755] exe[463220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576d14e9378 cs:33 sp:7f55bee60f90 ax:7f55bee61020 si:ffffffffff600000 di:5576d15b3263 [205753.681930] exe[350429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5fdf7f378 cs:33 sp:7f46535c5f90 ax:7f46535c6020 si:ffffffffff600000 di:55e5fe049263 [205764.208091] exe[456381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc97325378 cs:33 sp:7f567b7c4f90 ax:7f567b7c5020 si:ffffffffff600000 di:55cc973ef263 [205811.260817] exe[473180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a11d42378 cs:33 sp:7f9d8f23df90 ax:7f9d8f23e020 si:ffffffffff600000 di:562a11e0c263 [205874.008752] exe[494169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddb3d7d378 cs:33 sp:7ed2f3271f90 ax:7ed2f3272020 si:ffffffffff600000 di:55ddb3e47263 [205876.879613] exe[494921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2d4d37378 cs:33 sp:7ef47b9fef90 ax:7ef47b9ff020 si:ffffffffff600000 di:55d2d4e01263 [205881.915785] exe[496300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563aa8ad4378 cs:33 sp:7ea0a04ecf90 ax:7ea0a04ed020 si:ffffffffff600000 di:563aa8b9e263 [205956.686771] exe[515804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555a3941378 cs:33 sp:7f1543c37f90 ax:7f1543c38020 si:ffffffffff600000 di:5555a3a0b263 [205996.440831] exe[526788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5513df378 cs:33 sp:7ebae5e9cf90 ax:7ebae5e9d020 si:ffffffffff600000 di:55a5514a9263 [206337.549308] exe[459955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9be46c378 cs:33 sp:7f56fd0a3f90 ax:7f56fd0a4020 si:ffffffffff600000 di:55d9be536263 [206631.388445] exe[655612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56002c505378 cs:33 sp:7f932ef40f90 ax:7f932ef41020 si:ffffffffff600000 di:56002c5cf263 [206668.822056] exe[623897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d6ab8e8 ax:ffffffffff600000 si:7f3f6d6abe08 di:ffffffffff600000 [206669.935683] exe[623425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d6ab8e8 ax:ffffffffff600000 si:7f3f6d6abe08 di:ffffffffff600000 [206669.935709] exe[530668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d68a8e8 ax:ffffffffff600000 si:7f3f6d68ae08 di:ffffffffff600000 [206671.930542] exe[400126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d68a8e8 ax:ffffffffff600000 si:7f3f6d68ae08 di:ffffffffff600000 [207593.587250] exe[883360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [207594.051514] exe[745666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [207594.052406] exe[745719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd228e8 ax:ffffffffff600000 si:7fc83fd22e08 di:ffffffffff600000 [207594.397158] exe[773493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [208740.525989] exe[120767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [208740.985809] exe[120856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [208741.049120] exe[120876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133dd8e8 ax:ffffffffff600000 si:7ea2133dde08 di:ffffffffff600000 [208741.373066] exe[120935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [209828.396382] exe[264046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d00eb3d378 cs:33 sp:7f15a2977f90 ax:7f15a2978020 si:ffffffffff600000 di:55d00ec07263 [210141.154719] exe[203969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9e1734378 cs:33 sp:7fd5595eef90 ax:7fd5595ef020 si:ffffffffff600000 di:55f9e17fe263 [211063.194735] exe[678365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5458b8e8 ax:ffffffffff600000 si:7ebd5458be08 di:ffffffffff600000 [211063.423928] exe[678419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5458b8e8 ax:ffffffffff600000 si:7ebd5458be08 di:ffffffffff600000 [211063.619883] exe[678473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5456a8e8 ax:ffffffffff600000 si:7ebd5456ae08 di:ffffffffff600000 [211095.175260] exe[686047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.290619] exe[686075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.544870] exe[686126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.908271] exe[686206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211096.098565] exe[686240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [213443.794397] exe[139183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [213444.352004] exe[139397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [213444.860271] exe[195835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [217366.583437] exe[261663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217366.791446] exe[261710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217367.046569] exe[261760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217367.331595] exe[261831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [219958.747296] exe[874429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d9725c506 cs:33 sp:7eea7a7928e8 ax:ffffffffff600000 si:7eea7a792e08 di:ffffffffff600000 [220086.664723] exe[779583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.097414] exe[778740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.499824] exe[779859] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.968417] exe[781638] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220088.346851] exe[779859] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220088.768374] exe[780931] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220089.210175] exe[792974] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [221810.266757] exe[269945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.470493] exe[89821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.479228] exe[244064] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221810.609987] exe[78473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.762127] exe[143789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221811.072692] exe[963463] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221811.714084] exe[683772] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221812.265564] exe[663052] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [222843.605144] exe[645079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222843.829000] exe[645020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222844.125589] exe[538784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222844.428748] exe[563758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [223817.164327] exe[667321] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223817.782342] exe[650521] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223818.332853] exe[653745] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223818.862109] exe[653745] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224278.085925] exe[992121] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224278.722242] exe[540084] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224279.372038] exe[541734] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224280.119712] exe[540830] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224330.586549] exe[522098] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224331.239786] exe[991983] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224331.839449] exe[674602] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224332.369172] exe[636274] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224888.960331] exe[127554] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224921.584213] exe[593221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [225217.171334] exe[109143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225217.471576] exe[163862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225217.741925] exe[156673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225218.012202] exe[120092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225344.174881] exe[36384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f459a506 cs:33 sp:7ff0389de8e8 ax:ffffffffff600000 si:7ff0389dee08 di:ffffffffff600000 [225776.565288] exe[248511] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [225801.198074] exe[284676] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225802.052800] exe[339071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225802.730940] exe[339071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225803.521859] exe[284676] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225978.796560] exe[138414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126c455506 cs:33 sp:7f7ad3d2d8e8 ax:ffffffffff600000 si:7f7ad3d2de08 di:ffffffffff600000 [226135.007325] exe[261441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.303946] exe[118362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.706770] exe[915513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.963541] exe[120483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226229.293320] exe[180158] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [227098.698674] exe[116560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.140651] exe[914707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.630206] exe[946956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.783774] exe[261496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.151391] exe[266265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227100.337034] exe[138381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.610798] exe[946956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227100.762634] exe[224451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.822363] exe[116542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621bf374506 cs:33 sp:7f6bc51408e8 ax:ffffffffff600000 si:7f6bc5140e08 di:ffffffffff600000 [227100.989272] exe[222482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227140.459501] warn_bad_vsyscall: 3 callbacks suppressed [227140.459504] exe[467130] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [227446.891686] exe[680623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d67844506 cs:33 sp:7f50b91a68e8 ax:ffffffffff600000 si:7f50b91a6e08 di:ffffffffff600000 [228706.640918] exe[298891] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [229273.533232] exe[958020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac8ce3c378 cs:33 sp:7f713a276f90 ax:7f713a277020 si:ffffffffff600000 di:55ac8cf06263 [229758.670777] exe[744232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac8ce8b506 cs:33 sp:7f713a2768e8 ax:ffffffffff600000 si:7f713a276e08 di:ffffffffff600000 [230673.617566] exe[7693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d685c7b378 cs:33 sp:7fe39dc79f90 ax:7fe39dc7a020 si:ffffffffff600000 di:55d685d45263 [230721.501141] exe[759723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4551eb506 cs:33 sp:7fac29f558e8 ax:ffffffffff600000 si:7fac29f55e08 di:ffffffffff600000 [237240.248608] exe[344405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f5710728f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237240.887345] exe[349199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f57106e6f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237241.303721] exe[352629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f5710749f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237672.717749] exe[738844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f4106719f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.092461] exe[749407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.681000] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.719573] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.782490] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.823981] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.871562] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.939954] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.996755] exe[738065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237674.029809] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [239030.582046] warn_bad_vsyscall: 20 callbacks suppressed [239030.582049] exe[334598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [239031.300605] exe[305091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [239032.090353] exe[300573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [240112.234432] exe[605848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f138657af88 ax:ffffffffff600000 si:20005680 di:ffffffffff600000 [240243.946509] exe[668490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0ca083f90 ax:7fd0ca084020 si:ffffffffff600000 di:55b517cc5263 [240244.185338] exe[635080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0ca083f90 ax:7fd0ca084020 si:ffffffffff600000 di:55b517cc5263 [240244.550870] exe[653368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0c9bfef90 ax:7fd0c9bff020 si:ffffffffff600000 di:55b517cc5263 [240598.278274] exe[668490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240598.491121] exe[623955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240598.648928] exe[655747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240732.765884] exe[686378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240732.906901] exe[794541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240733.117117] exe[606303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240733.154787] exe[794319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [241514.906755] exe[651132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241515.515078] exe[617403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241516.342813] exe[681867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241516.350312] exe[916209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc05ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [243003.402548] exe[618135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec8df8e8 ax:ffffffffff600000 si:7ffaec8dfe08 di:ffffffffff600000 [243004.085203] exe[605712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec8be8e8 ax:ffffffffff600000 si:7ffaec8bee08 di:ffffffffff600000 [243004.584166] exe[610522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec87c8e8 ax:ffffffffff600000 si:7ffaec87ce08 di:ffffffffff600000 [243742.411167] exe[498250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587d68e8 ax:ffffffffff600000 si:7fd9587d6e08 di:ffffffffff600000 [243742.671726] exe[492458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.786573] exe[500905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.822219] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.880046] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.919908] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.954202] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.980531] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243743.029380] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243743.051169] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [244828.600933] warn_bad_vsyscall: 57 callbacks suppressed [244828.600937] exe[622496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [244829.059521] exe[621172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [244829.361298] exe[621160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [247277.253613] exe[801227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [247277.601387] exe[769808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [247277.608445] exe[769590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826968e8 ax:ffffffffff600000 si:7ff782696e08 di:ffffffffff600000 [247277.988064] exe[771041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [251960.766815] exe[509011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [251960.934442] exe[509049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [251961.095344] exe[509088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [252008.255129] exe[519268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.418357] exe[519304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.644357] exe[519354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.784956] exe[519393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.930740] exe[519425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252009.085447] exe[519456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252009.281698] exe[519502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252886.134590] exe[714576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [252886.390269] exe[714636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [252886.776034] exe[714680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [253531.362427] exe[858924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253532.614859] exe[859449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253533.472669] exe[860883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253534.461865] exe[861061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [258892.410661] exe[946863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.826336] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.860441] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.884815] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.909925] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.939613] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.973494] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.003833] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.028789] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.057488] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [260240.826360] warn_bad_vsyscall: 25 callbacks suppressed [260240.826364] exe[301521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.340398] exe[361933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.418387] exe[361294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.892899] exe[301195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [261648.629851] exe[728600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [261648.790508] exe[728644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [261649.177162] exe[728732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [264599.630215] exe[364615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264599.791712] exe[364639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264599.979813] exe[364665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264600.193828] exe[364708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [266107.041646] exe[509204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f284563a8e8 ax:ffffffffff600000 si:7f284563ae08 di:ffffffffff600000 [266107.625386] exe[521616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f284563a8e8 ax:ffffffffff600000 si:7f284563ae08 di:ffffffffff600000 [266107.658243] exe[590030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f28451dd8e8 ax:ffffffffff600000 si:7f28451dde08 di:ffffffffff600000 [266107.789763] exe[517153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f28451fe8e8 ax:ffffffffff600000 si:7f28451fee08 di:ffffffffff600000 [267172.069406] exe[33190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.296226] exe[33243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.508115] exe[33282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.724104] exe[33328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [268846.388707] exe[374434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268847.003069] exe[400364] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268847.607489] exe[376547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268848.125112] exe[363599] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268848.804028] exe[400812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268849.308395] exe[400364] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268849.828423] exe[400812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [269054.507512] exe[66545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269055.280742] exe[375202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269055.986048] exe[973128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269056.466798] exe[973128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269057.213052] exe[71625] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269057.733715] exe[375202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269058.459832] exe[50169] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269501.791204] exe[434807] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269502.619259] exe[431831] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269503.276246] exe[465588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269503.875606] exe[434717] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269776.990139] exe[390233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.324461] exe[456314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.568237] exe[456562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [269777.610443] exe[544717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.692516] exe[291996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581a2c2c506 cs:33 sp:7f432877d8e8 ax:ffffffffff600000 si:7f432877de08 di:ffffffffff600000 [269777.820620] exe[456265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [269777.865858] exe[255885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.881428] exe[404759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b8c4e4506 cs:33 sp:7f48365db8e8 ax:ffffffffff600000 si:7f48365dbe08 di:ffffffffff600000 [269778.092280] exe[270588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581a2c2c506 cs:33 sp:7f432877d8e8 ax:ffffffffff600000 si:7f432877de08 di:ffffffffff600000 [269778.152404] exe[255838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [270535.101375] warn_bad_vsyscall: 3 callbacks suppressed [270535.101377] exe[674547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270535.824811] exe[550615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270536.772723] exe[551913] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270537.516343] exe[674547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270538.516658] exe[568618] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270539.034799] exe[550615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270539.849793] exe[673369] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270855.503404] exe[729054] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270856.234283] exe[729054] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270857.158015] exe[730065] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270857.896990] exe[728122] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270968.863206] exe[468353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270969.561929] exe[453841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270970.018912] exe[365060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270970.525922] exe[479834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [271044.112770] exe[463520] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271044.952563] exe[434945] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271045.851083] exe[812327] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271046.880727] exe[434945] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271817.243371] exe[561218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271817.638305] exe[555431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271817.997300] exe[577976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271818.359816] exe[555766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271942.616652] exe[993348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [271942.844347] exe[993396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [271943.043186] exe[993469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [272076.906926] exe[890867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [272095.594494] exe[949939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272095.815686] exe[949949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272095.975872] exe[14237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272096.101823] exe[949945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272479.228830] exe[94665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.361176] exe[44146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.560865] exe[41480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.718755] exe[70618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272706.212554] exe[913785] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [272901.288739] exe[39003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f4e1d2506 cs:33 sp:7f9916d958e8 ax:ffffffffff600000 si:7f9916d95e08 di:ffffffffff600000 [272987.671117] exe[543783] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [273523.678625] exe[10259] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [273590.830162] exe[787583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [274356.976583] exe[588333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274357.793913] exe[588536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274357.866279] exe[588536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274358.063132] exe[588603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274358.099053] exe[588613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b4c8e8 ax:ffffffffff600000 si:7ed599b4ce08 di:ffffffffff600000 [275566.735752] exe[867748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f48e8 ax:ffffffffff600000 si:7fe3af4f4e08 di:ffffffffff600000 [275610.201844] exe[615569] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [276402.742032] exe[436452] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [276641.382908] exe[42182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [276641.560861] exe[948076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [276641.767781] exe[46280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [277600.080872] exe[205595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7e9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.348199] exe[205595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7e9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.448083] exe[173074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7c8f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.660154] exe[193878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7c8f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [278651.848834] exe[794070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564011c37506 cs:33 sp:7f862e2778e8 ax:ffffffffff600000 si:7f862e277e08 di:ffffffffff600000 [278914.516760] exe[636552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2553e5506 cs:33 sp:7f62869c98e8 ax:ffffffffff600000 si:7f62869c9e08 di:ffffffffff600000 [283222.671593] exe[306815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af82df88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283222.999293] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.032219] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.062041] exe[592215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.091830] exe[593614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.119116] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.153160] exe[370178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.180661] exe[370178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.210581] exe[362720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.237996] exe[362720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283650.563392] warn_bad_vsyscall: 57 callbacks suppressed [283650.563394] exe[291204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [283650.885504] exe[616939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [283651.137968] exe[616939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [284747.593248] exe[976776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a67a8e8 ax:ffffffffff600000 si:7fcb8a67ae08 di:ffffffffff600000 [284748.550640] exe[723472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a6598e8 ax:ffffffffff600000 si:7fcb8a659e08 di:ffffffffff600000 [284749.553542] exe[690429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a6598e8 ax:ffffffffff600000 si:7fcb8a659e08 di:ffffffffff600000 [286337.822160] exe[381278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286338.467468] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286338.641553] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286339.131011] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286339.342110] exe[129046] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [287119.268731] exe[541875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [287119.422998] exe[541905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [287119.928351] exe[542013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [291492.981392] exe[316342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [291493.505376] exe[316697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [291493.939884] exe[334859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [304309.558956] exe[168924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54cbff88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [304310.164026] exe[134021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54c9ef88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [304310.816110] exe[120039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54cbff88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [305557.230343] exe[756951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e043cc8e8 ax:ffffffffff600000 si:7f7e043cce08 di:ffffffffff600000 [305557.955700] exe[740887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e043cc8e8 ax:ffffffffff600000 si:7f7e043cce08 di:ffffffffff600000 [305558.246452] exe[740264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e0438a8e8 ax:ffffffffff600000 si:7f7e0438ae08 di:ffffffffff600000 [308214.771120] exe[654370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8afff90 ax:7f46a8b00020 si:ffffffffff600000 di:55a74ec07263 [308214.930941] exe[220620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8afff90 ax:7f46a8b00020 si:ffffffffff600000 di:55a74ec07263 [308215.034216] exe[666313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8adef90 ax:7f46a8adf020 si:ffffffffff600000 di:55a74ec07263 [314018.392693] exe[420894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.542019] exe[420923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.681221] exe[420947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.713790] exe[420947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.132682] exe[442781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.371345] exe[442826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.557266] exe[442867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.766261] exe[442910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.887886] exe[442933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.239332] exe[443007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.375505] exe[443034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.526485] exe[443062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.623355] exe[443079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.760138] exe[443099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [315901.564428] warn_bad_vsyscall: 5 callbacks suppressed [315901.564433] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315902.592214] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315903.451300] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315904.162257] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315904.721217] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315905.488657] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315906.050232] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [316731.920819] exe[26454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [316732.340623] exe[842372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [316732.632289] exe[990692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [317410.450053] exe[227650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317410.775487] exe[207302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.300393] exe[77120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.356928] exe[75913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef82402506 cs:33 sp:7fe9645658e8 ax:ffffffffff600000 si:7fe964565e08 di:ffffffffff600000 [317411.381251] exe[207072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3dfac4506 cs:33 sp:7f7acbe478e8 ax:ffffffffff600000 si:7f7acbe47e08 di:ffffffffff600000 [317411.431952] exe[96633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56555009e506 cs:33 sp:7f2c230508e8 ax:ffffffffff600000 si:7f2c23050e08 di:ffffffffff600000 [317411.605607] exe[75390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.679994] exe[228091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef82402506 cs:33 sp:7fe9645658e8 ax:ffffffffff600000 si:7fe964565e08 di:ffffffffff600000 [317411.753895] exe[115779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3dfac4506 cs:33 sp:7f7acbe478e8 ax:ffffffffff600000 si:7f7acbe47e08 di:ffffffffff600000 [317411.876140] exe[207998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56555009e506 cs:33 sp:7f2c230508e8 ax:ffffffffff600000 si:7f2c23050e08 di:ffffffffff600000 [317829.120326] warn_bad_vsyscall: 3 callbacks suppressed [317829.120329] exe[258250] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317829.615736] exe[975487] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317830.057748] exe[975487] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317830.567120] exe[228663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317831.085541] exe[975311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317831.542964] exe[232746] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317832.039231] exe[975311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [318415.232253] exe[493718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.405502] exe[493751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.557862] exe[493786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.730032] exe[493827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [319085.856549] exe[310110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319086.381364] exe[553926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319086.890221] exe[312518] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319087.472472] exe[309615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319271.022465] exe[695425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.231194] exe[695476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.410572] exe[695515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.566906] exe[695559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319952.827626] exe[845278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319953.649665] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319954.406857] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319955.041177] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [320726.866229] exe[52877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [320726.962441] exe[52902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [320727.121159] exe[52938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [321627.526842] exe[897524] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321628.036921] exe[897438] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321628.652962] exe[958177] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321629.264739] exe[897524] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321989.483588] exe[166102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321990.340963] exe[169275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321991.018513] exe[144093] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321991.765754] exe[166102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [322299.844844] exe[345327] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [322364.801512] exe[332978] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [323167.418212] exe[788589] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [323397.864372] exe[246027] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [323511.410031] exe[366918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323511.905428] exe[293816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323512.333640] exe[667267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323512.717163] exe[296026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323662.733119] exe[554723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.124199] exe[491452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.315434] exe[576664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.590856] exe[491578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323913.607059] exe[479329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aae2f2a506 cs:33 sp:7fec1dbf68e8 ax:ffffffffff600000 si:7fec1dbf6e08 di:ffffffffff600000 [324216.899705] exe[892705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.174356] exe[817985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.350690] exe[811842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.572374] exe[892072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324261.457869] exe[908766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef93143a8e8 ax:ffffffffff600000 si:7ef93143ae08 di:ffffffffff600000 [324261.796712] exe[908820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef930ffe8e8 ax:ffffffffff600000 si:7ef930ffee08 di:ffffffffff600000 [324262.345523] exe[908938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef93143a8e8 ax:ffffffffff600000 si:7ef93143ae08 di:ffffffffff600000 [324262.375693] exe[908949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef930ffe8e8 ax:ffffffffff600000 si:7ef930ffee08 di:ffffffffff600000 [324490.425898] exe[745282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9a046506 cs:33 sp:7f93f5e4e8e8 ax:ffffffffff600000 si:7f93f5e4ee08 di:ffffffffff600000 [324739.900756] exe[933265] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [325657.889394] exe[153927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.058365] exe[154180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.412060] exe[217026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.547112] exe[155074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325998.544232] exe[241545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [327017.667383] exe[561874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563db3e05378 cs:33 sp:7f6529196f90 ax:7f6529197020 si:ffffffffff600000 di:563db3ecf263 [327053.596527] exe[481272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cedbde5378 cs:33 sp:7f38c175cf90 ax:7f38c175d020 si:ffffffffff600000 di:55cedbeaf263 [327064.957877] exe[588818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b0c2f5378 cs:33 sp:7ede03b0af90 ax:7ede03b0b020 si:ffffffffff600000 di:559b0c3bf263 [327081.439684] exe[516795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d3dc0d378 cs:33 sp:7f515b04df90 ax:7f515b04e020 si:ffffffffff600000 di:558d3dcd7263 [327149.256313] exe[465007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74a8a4378 cs:33 sp:7f5b96659f90 ax:7f5b9665a020 si:ffffffffff600000 di:55b74a96e263 [327256.867260] exe[632097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba8a0fc378 cs:33 sp:7eac3bca5f90 ax:7eac3bca6020 si:ffffffffff600000 di:55ba8a1c6263 [327370.987013] exe[658201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fd82d6378 cs:33 sp:7ed0d209cf90 ax:7ed0d209d020 si:ffffffffff600000 di:557fd83a0263 [327480.681947] exe[663943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc62508378 cs:33 sp:7fa0e0855f90 ax:7fa0e0856020 si:ffffffffff600000 di:55cc625d2263 [327544.914642] exe[676084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815e87c378 cs:33 sp:7f2d27522f90 ax:7f2d27523020 si:ffffffffff600000 di:55815e946263 [327556.108801] exe[705212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a8e8e8378 cs:33 sp:7ed28d346f90 ax:7ed28d347020 si:ffffffffff600000 di:555a8e9b2263 [327663.961484] exe[723739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56251ffc0506 cs:33 sp:7f9763afc8e8 ax:ffffffffff600000 si:7f9763afce08 di:ffffffffff600000 [327881.734436] exe[691492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b08908f506 cs:33 sp:7f53d46688e8 ax:ffffffffff600000 si:7f53d4668e08 di:ffffffffff600000 [327927.043825] exe[776028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ad7841378 cs:33 sp:7f304c586f90 ax:7f304c587020 si:ffffffffff600000 di:564ad790b263 [327940.783150] exe[715021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561dd0a40378 cs:33 sp:7ff343ed6f90 ax:7ff343ed7020 si:ffffffffff600000 di:561dd0b0a263 [328254.085040] exe[734320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f417c59378 cs:33 sp:7fa2838eff90 ax:7fa2838f0020 si:ffffffffff600000 di:55f417d23263 [328285.078592] exe[810905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b089040378 cs:33 sp:7f53d4668f90 ax:7f53d4669020 si:ffffffffff600000 di:55b08910a263 [328387.347841] exe[216802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc1ae37506 cs:33 sp:7fb37da9b8e8 ax:ffffffffff600000 si:7fb37da9be08 di:ffffffffff600000 [328917.366692] exe[955682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6b4a5a378 cs:33 sp:7f668a7aaf90 ax:7f668a7ab020 si:ffffffffff600000 di:55b6b4b24263 [329091.806545] exe[800851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfdc97e378 cs:33 sp:7f3d51be9f90 ax:7f3d51bea020 si:ffffffffff600000 di:55bfdca48263 [330389.779984] exe[691797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd4af90 ax:7f59bbd4b020 si:ffffffffff600000 di:55d4375d2263 [330390.248077] exe[65074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd4af90 ax:7f59bbd4b020 si:ffffffffff600000 di:55d4375d2263 [330390.909464] exe[691834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd29f90 ax:7f59bbd2a020 si:ffffffffff600000 di:55d4375d2263 [331260.888333] exe[368442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331261.256223] exe[357979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595b8f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331261.636409] exe[358063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331262.098037] exe[358026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331262.470204] exe[358861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [332759.732896] exe[637399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.836450] exe[637399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.934428] exe[259971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.972948] exe[289764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [334860.688139] exe[805356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829fe8e8 ax:ffffffffff600000 si:7f43829fee08 di:ffffffffff600000 [334860.890172] exe[694922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829fe8e8 ax:ffffffffff600000 si:7f43829fee08 di:ffffffffff600000 [334861.354456] exe[686534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829dd8e8 ax:ffffffffff600000 si:7f43829dde08 di:ffffffffff600000 [341497.565186] exe[499745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [341497.774375] exe[499795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [341497.952894] exe[499832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [344620.374142] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [344620.962216] exe[689720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [344621.483425] exe[695387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [345013.562828] exe[327493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fbacdf90 ax:7eb0fbace020 si:ffffffffff600000 di:55e600c14263 [345013.761298] exe[327525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fbaacf90 ax:7eb0fbaad020 si:ffffffffff600000 di:55e600c14263 [345013.975752] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.003760] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.036183] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.072354] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.102721] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.137275] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.170873] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.218241] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345480.272409] warn_bad_vsyscall: 27 callbacks suppressed [345480.272413] exe[350010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [345482.273805] exe[115861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [345482.973548] exe[731146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [348062.344421] exe[45218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [348062.518732] exe[45259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [348062.728454] exe[45304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [353851.241686] exe[594713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353851.442576] exe[594759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353853.688129] exe[595300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353882.720681] exe[754175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [353883.319775] exe[23620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [353883.747256] exe[35589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [354050.241813] exe[645752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711ed8e8 ax:ffffffffff600000 si:7fed711ede08 di:ffffffffff600000 [354051.015545] exe[641737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711cc8e8 ax:ffffffffff600000 si:7fed711cce08 di:ffffffffff600000 [354051.177855] exe[645380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711ab8e8 ax:ffffffffff600000 si:7fed711abe08 di:ffffffffff600000 [358646.280424] exe[596066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567f048e8 ax:ffffffffff600000 si:7f7567f04e08 di:ffffffffff600000 [358646.530899] exe[591684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567ee38e8 ax:ffffffffff600000 si:7f7567ee3e08 di:ffffffffff600000 [358646.706304] exe[598295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567ee38e8 ax:ffffffffff600000 si:7f7567ee3e08 di:ffffffffff600000 [358731.321914] exe[654521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.630295] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.660582] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.698519] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.733215] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.767574] exe[676480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.798800] exe[676480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.833235] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.869582] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.904934] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [360540.905164] warn_bad_vsyscall: 25 callbacks suppressed [360540.905167] exe[859138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed78f8e8 ax:ffffffffff600000 si:7fc9ed78fe08 di:ffffffffff600000 [360541.064122] exe[708016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed78f8e8 ax:ffffffffff600000 si:7fc9ed78fe08 di:ffffffffff600000 [360541.222619] exe[648700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed76e8e8 ax:ffffffffff600000 si:7fc9ed76ee08 di:ffffffffff600000 [363446.399003] exe[574176] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363446.883387] exe[574176] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363447.380121] exe[571935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363447.878165] exe[571935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363448.727975] exe[571457] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363449.362172] exe[570905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363449.788185] exe[580249] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [364029.925565] exe[430139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad8222ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [364030.216641] exe[430139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad815fef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [364030.442590] exe[519812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad815ddf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [365180.068106] exe[986216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.234664] exe[781148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.379306] exe[985963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5596e8506 cs:33 sp:7fe6488388e8 ax:ffffffffff600000 si:7fe648838e08 di:ffffffffff600000 [365180.411987] exe[985715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365180.506257] exe[906615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.638096] exe[985983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365180.641528] exe[783766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5596e8506 cs:33 sp:7fe6488388e8 ax:ffffffffff600000 si:7fe648838e08 di:ffffffffff600000 [365180.732698] exe[4976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.745204] exe[848185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8e537506 cs:33 sp:7fc094c928e8 ax:ffffffffff600000 si:7fc094c92e08 di:ffffffffff600000 [365180.790763] exe[770106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365226.888779] warn_bad_vsyscall: 3 callbacks suppressed [365226.888782] exe[974535] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365227.358644] exe[851380] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365227.785438] exe[851380] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365228.252849] exe[972142] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365228.906467] exe[852317] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365229.384293] exe[845640] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365229.917544] exe[852317] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365585.689662] exe[89242] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365586.147086] exe[82648] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365586.659429] exe[67099] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365587.097865] exe[131554] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [366263.949972] exe[93795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.095313] exe[94014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.360581] exe[315861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.439502] exe[91392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366372.533981] exe[290852] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366373.133782] exe[281450] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366373.937145] exe[281007] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366374.630402] exe[287598] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366492.726510] exe[378469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366492.895324] exe[378516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366493.065075] exe[378557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366493.252502] exe[378606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [367486.041906] exe[352964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.112035] exe[350082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.195507] exe[348868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.502302] exe[348910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367655.617738] exe[646225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367655.765969] exe[646254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367655.964536] exe[646292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367656.143497] exe[646328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [368055.014021] exe[664256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.282959] exe[683121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.469260] exe[664439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.648001] exe[664742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [369134.001731] exe[931566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.313152] exe[816229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.504790] exe[932742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.684763] exe[929420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369396.665050] exe[837396] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [369432.269645] exe[945221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369432.841508] exe[945782] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369433.373941] exe[34704] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369433.966806] exe[945221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [370125.512194] exe[980701] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370125.866230] exe[182074] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370126.619151] exe[181445] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370127.301336] exe[62393] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370248.578288] exe[115486] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370276.201786] exe[138336] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370324.712861] exe[829186] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [371825.011924] exe[559216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d84f506 cs:33 sp:7faa8389c8e8 ax:ffffffffff600000 si:7faa8389ce08 di:ffffffffff600000 [372021.574939] exe[256020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [372039.486835] exe[429546] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [372496.786423] exe[158259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566ebe99506 cs:33 sp:7f54bd0b88e8 ax:ffffffffff600000 si:7f54bd0b8e08 di:ffffffffff600000 [373943.837970] exe[989632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556457f07506 cs:33 sp:7f16955728e8 ax:ffffffffff600000 si:7f1695572e08 di:ffffffffff600000 [373993.165521] exe[11923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ddbaac506 cs:33 sp:7fec2aa938e8 ax:ffffffffff600000 si:7fec2aa93e08 di:ffffffffff600000 [374098.062241] exe[789008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e1bdf6506 cs:33 sp:7f349a7738e8 ax:ffffffffff600000 si:7f349a773e08 di:ffffffffff600000 [376478.249238] exe[510497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573fe8e8 ax:ffffffffff600000 si:7ea1573fee08 di:ffffffffff600000 [376478.452136] exe[510558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573dd8e8 ax:ffffffffff600000 si:7ea1573dde08 di:ffffffffff600000 [376478.677248] exe[510597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573fe8e8 ax:ffffffffff600000 si:7ea1573fee08 di:ffffffffff600000 [380183.129347] exe[317423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [380183.267688] exe[318417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [380183.374007] exe[342268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [382632.563874] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382632.769905] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382632.902976] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.198478] exe[296340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.289440] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.384672] exe[296539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.559584] exe[295117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.701753] exe[296519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.826919] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.924979] exe[295856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.016463] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.087915] exe[295095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.201380] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382774.999379] exe[296519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.214504] exe[295271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.401679] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.439055] exe[360494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382775.568769] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.659163] exe[296126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.883151] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.056413] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.238494] exe[296077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.276339] exe[296077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.014028] warn_bad_vsyscall: 75 callbacks suppressed [382780.014031] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.334990] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.828403] exe[296102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.859456] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.897979] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.933736] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.967809] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.003534] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.036344] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.073913] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382785.723609] warn_bad_vsyscall: 45 callbacks suppressed [382785.723612] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.140949] exe[296079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382786.288358] exe[532485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.620127] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.975165] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382787.344975] exe[295175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382787.967385] exe[295271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.114865] exe[304955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.151717] exe[359804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.381729] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382791.886046] warn_bad_vsyscall: 7 callbacks suppressed [382791.886049] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.163574] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.221854] exe[295850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.361344] exe[295888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.503166] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.664326] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.870529] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.294572] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.522817] exe[364486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.661138] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382796.904366] warn_bad_vsyscall: 14 callbacks suppressed [382796.904369] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382796.917391] exe[532575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382797.640396] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382797.919495] exe[360439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382797.971126] exe[304974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382798.603828] exe[295511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382798.824011] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.109316] exe[296306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.309270] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.566845] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382802.166698] warn_bad_vsyscall: 69 callbacks suppressed [382802.166701] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382802.316132] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382803.128338] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382803.496957] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.087062] exe[364491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.212787] exe[296341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.520817] exe[360667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.731219] exe[359689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.785013] exe[295175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382804.962302] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.274554] warn_bad_vsyscall: 13 callbacks suppressed [382807.274557] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.351486] exe[364495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.540345] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.789489] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.037719] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.228567] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.857436] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.162148] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.363261] exe[295117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.637142] exe[304974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382812.284114] warn_bad_vsyscall: 75 callbacks suppressed [382812.284118] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382813.112771] exe[307990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382813.187408] exe[295211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.010363] exe[296341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.041344] exe[304955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.139309] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.243526] exe[295888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.286883] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.536589] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.812824] exe[295838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382817.380896] warn_bad_vsyscall: 8 callbacks suppressed [382817.380899] exe[305008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382817.956184] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382818.257711] exe[295457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382818.460882] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382819.136818] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382819.266187] exe[295229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382820.109876] exe[295278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382820.256329] exe[295445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382820.311929] exe[295445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382820.342096] exe[295184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.390640] warn_bad_vsyscall: 67 callbacks suppressed [382822.390642] exe[359928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382822.878579] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.906845] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.936717] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.965560] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.995701] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.026742] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.055860] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.086953] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.120098] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382827.414524] warn_bad_vsyscall: 49 callbacks suppressed [382827.414527] exe[295839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382827.650241] exe[296342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.031848] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.066992] exe[295856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.314381] exe[295172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.416304] exe[359705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.579511] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.629407] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.663835] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.694589] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382832.464385] warn_bad_vsyscall: 38 callbacks suppressed [382832.464388] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382832.698568] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382832.755706] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.070338] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.332885] exe[296102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.629444] exe[296340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.841051] exe[304976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.919742] exe[296089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382834.278035] exe[304959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382834.411299] exe[295166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.688759] warn_bad_vsyscall: 44 callbacks suppressed [382837.688762] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.854754] exe[359707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.910710] exe[360554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.573668] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.726693] exe[295169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.851732] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.983327] exe[296079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.016347] exe[295838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.349940] exe[295839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.465758] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382842.950532] warn_bad_vsyscall: 81 callbacks suppressed [382842.950535] exe[295259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382843.902982] exe[359705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382844.005862] exe[295893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382845.028196] exe[359707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.065157] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.096426] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.123896] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.151313] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.176412] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.205999] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382847.956775] warn_bad_vsyscall: 59 callbacks suppressed [382847.956778] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382847.992672] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.025390] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.059739] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.094970] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.137075] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.171876] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.199918] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.228567] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.266159] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.066251] warn_bad_vsyscall: 87 callbacks suppressed [382853.066254] exe[296126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.254299] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.463249] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.539235] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.761601] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.975905] exe[295207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.158760] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.416496] exe[295889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.574982] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.789347] exe[359754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.143687] warn_bad_vsyscall: 17 callbacks suppressed [382858.143691] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.351947] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.500911] exe[295198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.533294] exe[359711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.708262] exe[360593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.101245] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.447071] exe[296085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.877258] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [385174.048843] exe[833560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385174.191645] exe[850104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385174.463878] exe[103500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385516.466348] exe[764960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [385516.849577] exe[138084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [385517.497422] exe[770698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [386065.129705] exe[57495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87bad28e8 ax:ffffffffff600000 si:7fd87bad2e08 di:ffffffffff600000 [386065.838065] exe[62778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87ba6f8e8 ax:ffffffffff600000 si:7fd87ba6fe08 di:ffffffffff600000 [386066.430379] exe[62881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87bad28e8 ax:ffffffffff600000 si:7fd87bad2e08 di:ffffffffff600000 [390352.256099] exe[941587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460b088e8 ax:ffffffffff600000 si:7ef460b08e08 di:ffffffffff600000 [390352.855664] exe[941662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460b088e8 ax:ffffffffff600000 si:7ef460b08e08 di:ffffffffff600000 [390352.904630] exe[941674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460a848e8 ax:ffffffffff600000 si:7ef460a84e08 di:ffffffffff600000 [390353.111783] exe[941704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460ae78e8 ax:ffffffffff600000 si:7ef460ae7e08 di:ffffffffff600000 [390355.572575] exe[419626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390355.765841] exe[419707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390356.023670] exe[888018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390356.028300] exe[419934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402366f90 ax:7fe402367020 si:ffffffffff600000 di:555be18b4263 [390808.923629] exe[944424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e619f8e8 ax:ffffffffff600000 si:7f09e619fe08 di:ffffffffff600000 [390809.095781] exe[957286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e617e8e8 ax:ffffffffff600000 si:7f09e617ee08 di:ffffffffff600000 [390809.880141] exe[957271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e619f8e8 ax:ffffffffff600000 si:7f09e619fe08 di:ffffffffff600000 [391284.514757] exe[101301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391284.666526] exe[101326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391284.827667] exe[101351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391497.963043] exe[23615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b83ef90 ax:7f4c5b83f020 si:ffffffffff600000 di:56123da74263 [391498.831701] exe[122375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b3fef90 ax:7f4c5b3ff020 si:ffffffffff600000 di:56123da74263 [391499.784086] exe[56643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b83ef90 ax:7f4c5b83f020 si:ffffffffff600000 di:56123da74263 [392230.882541] exe[224517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bfe8e8 ax:ffffffffff600000 si:7ee151bfee08 di:ffffffffff600000 [392230.994703] exe[224530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bdd8e8 ax:ffffffffff600000 si:7ee151bdde08 di:ffffffffff600000 [392231.114656] exe[224543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bfe8e8 ax:ffffffffff600000 si:7ee151bfee08 di:ffffffffff600000 [394723.117649] exe[532684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394724.163847] exe[574299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394725.161639] exe[543317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394725.161991] exe[526758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.731599] exe[667267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [395919.828666] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.862607] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.890503] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.920863] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.950189] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.978828] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.008407] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.039745] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.067391] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [396830.646925] warn_bad_vsyscall: 25 callbacks suppressed [396830.646928] exe[876667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396830.897326] exe[876701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396831.127973] exe[876738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396831.192566] exe[876738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [397840.098230] exe[967648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6fdf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.631450] exe[2736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6bbf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.829495] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.895929] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.929995] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.965012] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.990763] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.018472] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.044829] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.073327] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [398295.666499] warn_bad_vsyscall: 25 callbacks suppressed [398295.666503] exe[98105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398295.859933] exe[98129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398295.912295] exe[98129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398296.193605] exe[98181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398296.232868] exe[98181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398310.091286] exe[100097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.245436] exe[100123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.351478] exe[100138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.588456] exe[100172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.766814] exe[100200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398311.031049] exe[100235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398311.146697] exe[100258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [399891.746018] exe[243871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [399892.031026] exe[290305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [399892.554324] exe[243912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [400349.334426] exe[392084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef02061f8e8 ax:ffffffffff600000 si:7ef02061fe08 di:ffffffffff600000 [400349.518144] exe[392106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef0201fe8e8 ax:ffffffffff600000 si:7ef0201fee08 di:ffffffffff600000 [400350.185378] exe[392190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef02061f8e8 ax:ffffffffff600000 si:7ef02061fe08 di:ffffffffff600000 [400350.243070] exe[392196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef0201fe8e8 ax:ffffffffff600000 si:7ef0201fee08 di:ffffffffff600000 [401982.811790] exe[692349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [401983.004533] exe[692387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [401983.004538] exe[692392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823d48e8 ax:ffffffffff600000 si:7eb4823d4e08 di:ffffffffff600000 [401983.508893] exe[692475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [402017.472906] exe[698311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.617877] exe[698337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.773050] exe[698357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.836299] exe[698357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402996.356014] exe[634598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f32f90 ax:7f8fb9f33020 si:ffffffffff600000 di:55e376922263 [402996.454524] exe[680017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f11f90 ax:7f8fb9f12020 si:ffffffffff600000 di:55e376922263 [402996.534513] exe[634597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f11f90 ax:7f8fb9f12020 si:ffffffffff600000 di:55e376922263 [403384.938961] exe[777895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6d73ff378 cs:33 sp:7f494881ff90 ax:7f4948820020 si:ffffffffff600000 di:55a6d74c9263 [403388.237401] exe[688633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eb3d79378 cs:33 sp:7efc4e5c3f90 ax:7efc4e5c4020 si:ffffffffff600000 di:558eb3e43263 [403470.383750] exe[790463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d2690a378 cs:33 sp:7ff22e0b9f90 ax:7ff22e0ba020 si:ffffffffff600000 di:557d269d4263 [403502.560866] exe[901412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bfa531378 cs:33 sp:7fa1c40fff90 ax:7fa1c4100020 si:ffffffffff600000 di:556bfa5fb263 [403552.445639] exe[938340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90b223378 cs:33 sp:7ed73b6cef90 ax:7ed73b6cf020 si:ffffffffff600000 di:55e90b2ed263 [403593.868542] exe[751581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eedc18c378 cs:33 sp:7ffad72a6f90 ax:7ffad72a7020 si:ffffffffff600000 di:55eedc256263 [403614.415897] exe[647202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fde1c58378 cs:33 sp:7efe4b513f90 ax:7efe4b514020 si:ffffffffff600000 di:55fde1d22263 [403621.822840] exe[948796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9a7e1d378 cs:33 sp:7ef7a048ef90 ax:7ef7a048f020 si:ffffffffff600000 di:55e9a7ee7263 [403631.531519] exe[890212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a07e059378 cs:33 sp:7ff3fedf2f90 ax:7ff3fedf3020 si:ffffffffff600000 di:55a07e123263 [403712.590005] exe[724209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f06e9378 cs:33 sp:7fa161f58f90 ax:7fa161f59020 si:ffffffffff600000 di:55b0f07b3263 [403750.768970] exe[669292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe3ebaa378 cs:33 sp:7fd6afbb2f90 ax:7fd6afbb3020 si:ffffffffff600000 di:55fe3ec74263 [403848.381122] exe[914605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564178b16378 cs:33 sp:7f0cf4f6bf90 ax:7f0cf4f6c020 si:ffffffffff600000 di:564178be0263 [403874.592148] exe[851983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649d7c10378 cs:33 sp:7fa9daf24f90 ax:7fa9daf25020 si:ffffffffff600000 di:5649d7cda263 [403908.840967] exe[993236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df4018e378 cs:33 sp:7ec4b0f4df90 ax:7ec4b0f4e020 si:ffffffffff600000 di:55df40258263 [405340.182898] exe[203090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592179b8378 cs:33 sp:7f5aebfb3f90 ax:7f5aebfb4020 si:ffffffffff600000 di:559217a82263 [405977.789785] exe[191317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [405977.908555] exe[191046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [405977.954469] exe[192853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109088e8 ax:ffffffffff600000 si:7f4710908e08 di:ffffffffff600000 [405978.097805] exe[261688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [408561.228963] exe[277598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebfb38e8 ax:ffffffffff600000 si:7f5aebfb3e08 di:ffffffffff600000 [408561.646060] exe[702629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.502623] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.544174] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.574013] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.601066] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.625833] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.650109] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.701805] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.737080] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408570.463931] warn_bad_vsyscall: 25 callbacks suppressed [408570.463934] exe[651457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408570.761990] exe[612681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408571.204120] exe[656243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408907.394547] exe[784939] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408907.959021] exe[783568] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408908.614797] exe[780068] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408909.057974] exe[779056] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408939.052126] exe[763141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cbc28e8 ax:ffffffffff600000 si:7fb95cbc2e08 di:ffffffffff600000 [408939.193472] exe[762486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cba18e8 ax:ffffffffff600000 si:7fb95cba1e08 di:ffffffffff600000 [408939.907174] exe[763471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cbc28e8 ax:ffffffffff600000 si:7fb95cbc2e08 di:ffffffffff600000 [409772.941587] exe[204372] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409773.593580] exe[182073] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409773.735726] exe[200088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409774.230552] exe[207155] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [413436.098468] exe[447984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [413436.416456] exe[447984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [413436.417629] exe[263849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bcc2f90 ax:7f961bcc3020 si:ffffffffff600000 di:5574058a0263 [413436.617867] exe[184089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [415237.381090] exe[484279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415237.701018] exe[475929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415238.079935] exe[473138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415238.084608] exe[471872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90998e8 ax:ffffffffff600000 si:7fd1b9099e08 di:ffffffffff600000 [415631.756483] exe[923750] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [415686.028201] exe[648853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [415686.255766] exe[571438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [415686.513780] exe[575328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [416542.609512] exe[574666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [416542.810695] exe[589172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [416542.990497] exe[577054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417498.582507] exe[211339] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.112488] exe[667020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.233816] exe[667020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.947994] exe[665999] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417500.099466] exe[916102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417693.286130] exe[101732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417693.720788] exe[120651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417693.910084] exe[182078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [418104.049323] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.262254] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.308335] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418104.502237] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.505705] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418178.085838] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418178.379107] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418178.644708] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.142073] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.400441] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.649627] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.767680] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.620658] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.725578] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.892044] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.181869] warn_bad_vsyscall: 11 callbacks suppressed [418183.181873] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.386669] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.542047] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.777375] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.069659] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.427309] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.637948] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.649037] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418185.058604] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418185.493594] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.289555] warn_bad_vsyscall: 13 callbacks suppressed [418188.289558] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.414757] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.612303] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.831459] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.053154] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.372760] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.574873] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.789555] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418189.988290] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418190.140010] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.352973] warn_bad_vsyscall: 17 callbacks suppressed [418193.352976] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.576998] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418193.661572] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.879593] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418194.139464] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.172453] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.409107] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.488392] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.515945] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.616036] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.426962] warn_bad_vsyscall: 25 callbacks suppressed [418198.426965] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.486488] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418198.684714] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.892984] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.926606] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.226443] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.261409] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.409363] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.643420] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.835008] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.445726] warn_bad_vsyscall: 70 callbacks suppressed [418203.445730] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.522237] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.634399] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.829774] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.947319] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.068126] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.194698] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.353540] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.443576] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.629416] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418208.752051] warn_bad_vsyscall: 32 callbacks suppressed [418208.752054] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418208.784448] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.075478] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.219447] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418209.480702] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418209.677781] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.951870] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.981701] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418210.137134] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418210.279967] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418213.837996] warn_bad_vsyscall: 32 callbacks suppressed [418213.838000] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.115833] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.396579] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.456987] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.584507] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.738787] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.939194] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.962309] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418215.249106] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418215.426363] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418218.949592] warn_bad_vsyscall: 32 callbacks suppressed [418218.949595] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.174806] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418219.312712] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.578383] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.807404] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.044752] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.226554] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.358357] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.583333] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.628582] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418223.971943] warn_bad_vsyscall: 47 callbacks suppressed [418223.971947] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418224.043326] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.280510] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.304110] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.331606] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.360028] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.382614] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.408975] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.442655] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.470334] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418228.986212] warn_bad_vsyscall: 61 callbacks suppressed [418228.986215] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4730f90 ax:7fd1e4731020 si:ffffffffff600000 di:55efd18b9263 [418229.282239] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.494105] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.518544] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.640075] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.661158] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.811323] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.028753] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.178857] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.309993] exe[132595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.126512] warn_bad_vsyscall: 34 callbacks suppressed [418234.126515] exe[132595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.289753] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.373648] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.446149] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.541651] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.801381] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.989817] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418235.160192] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418236.824023] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418237.009542] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418333.934606] warn_bad_vsyscall: 3 callbacks suppressed [418333.934610] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.105326] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.395154] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.732084] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.054176] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.358175] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.548791] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.773744] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418336.056789] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418336.160002] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418548.755843] warn_bad_vsyscall: 3 callbacks suppressed [418548.755847] exe[376318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd5cab378 cs:33 sp:7f1271ec0f90 ax:7f1271ec1020 si:ffffffffff600000 di:555fd5d75263 [418557.217551] exe[378765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82cac0378 cs:33 sp:7ece13a42f90 ax:7ece13a43020 si:ffffffffff600000 di:55f82cb8a263 [418839.087390] exe[53054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b93060378 cs:33 sp:7feb1c03df90 ax:7feb1c03e020 si:ffffffffff600000 di:561b9312a263 [418853.093466] exe[36834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ead929378 cs:33 sp:7f5e669b7f90 ax:7f5e669b8020 si:ffffffffff600000 di:555ead9f3263 [418969.017697] exe[403439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722f473378 cs:33 sp:7fbaee0bcf90 ax:7fbaee0bd020 si:ffffffffff600000 di:55722f53d263 [418983.999635] exe[444910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648631f378 cs:33 sp:7ea7747fef90 ax:7ea7747ff020 si:ffffffffff600000 di:5564863e9263 [419011.006164] exe[109976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561003033378 cs:33 sp:7fd506c6df90 ax:7fd506c6e020 si:ffffffffff600000 di:5610030fd263 [419019.775936] exe[422256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dae604378 cs:33 sp:7efd22591f90 ax:7efd22592020 si:ffffffffff600000 di:562dae6ce263 [419077.312445] exe[112861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56423e1ab378 cs:33 sp:7fb195175f90 ax:7fb195176020 si:ffffffffff600000 di:56423e275263 [419258.683264] exe[462034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643836a2378 cs:33 sp:7feff975df90 ax:7feff975e020 si:ffffffffff600000 di:56438376c263 [419320.879379] exe[680834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561593356378 cs:33 sp:7fc34da5af90 ax:7fc34da5b020 si:ffffffffff600000 di:561593420263 [419338.633785] exe[499314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbeaaa3378 cs:33 sp:7eb6821f0f90 ax:7eb6821f1020 si:ffffffffff600000 di:55bbeab6d263 [419491.961314] exe[483313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653d0e96378 cs:33 sp:7fa2479daf90 ax:7fa2479db020 si:ffffffffff600000 di:5653d0f60263 [421449.526018] exe[638197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421450.533339] exe[934477] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421451.080722] exe[851645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421451.221261] exe[680604] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [422178.612876] exe[875108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422178.928396] exe[866500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422178.987639] exe[866504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422179.167042] exe[866500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [424600.851779] exe[252498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79134f90 ax:7faa79135020 si:ffffffffff600000 di:555cf61d4263 [424600.986166] exe[250622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79113f90 ax:7faa79114020 si:ffffffffff600000 di:555cf61d4263 [424601.135949] exe[250622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79113f90 ax:7faa79114020 si:ffffffffff600000 di:555cf61d4263 [426557.880508] exe[581731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426557.977327] exe[581737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426558.025392] exe[581737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426558.157128] exe[581754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [428694.567856] exe[795404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.703818] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.733316] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.817106] exe[814764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.845303] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad270f90 ax:7fd7ad271020 si:ffffffffff600000 di:5573dd732263 [428776.327080] exe[897245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [428776.693777] exe[895974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [428776.959978] exe[896011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [429440.191674] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.411358] exe[956295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.471116] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.677712] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429487.590469] exe[745129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [429487.842985] exe[745894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [429488.274964] exe[687729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [431520.317787] exe[294739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [431520.505386] exe[294777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [431520.532544] exe[294779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def0a8e8 ax:ffffffffff600000 si:7ec6def0ae08 di:ffffffffff600000 [431520.690793] exe[294799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [432213.116052] exe[400600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.330291] exe[400635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.487960] exe[400664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.524177] exe[400666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb65fe8e8 ax:ffffffffff600000 si:7eddb65fee08 di:ffffffffff600000 [433475.349338] exe[501690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433475.736337] exe[565214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433476.251462] exe[555799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433906.182693] exe[663239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [433906.368674] exe[663261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [433906.565778] exe[663291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [434569.538788] exe[601416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [434569.843255] exe[647359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [434570.268909] exe[601398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [435094.733960] exe[544607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435095.032811] exe[447209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435095.650903] exe[768277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435302.925459] exe[884068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec07df90 ax:7f6cec07e020 si:ffffffffff600000 di:5614e600a263 [435302.987559] exe[881436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec05cf90 ax:7f6cec05d020 si:ffffffffff600000 di:5614e600a263 [435303.056939] exe[884087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec07df90 ax:7f6cec07e020 si:ffffffffff600000 di:5614e600a263 [436132.227595] exe[8027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ab4e00378 cs:33 sp:7f33b449ff90 ax:7f33b44a0020 si:ffffffffff600000 di:558ab4eca263 [436138.448812] exe[626538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ab7812378 cs:33 sp:7f02ceda1f90 ax:7f02ceda2020 si:ffffffffff600000 di:559ab78dc263 [436210.698512] exe[26270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a992ea0378 cs:33 sp:7f9bef101f90 ax:7f9bef102020 si:ffffffffff600000 di:55a992f6a263 [436267.377827] exe[858834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436267.478446] exe[854807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436267.611095] exe[854807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436294.189828] exe[912966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.265955] exe[971983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.351428] exe[912972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.352864] exe[912966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f278e8 ax:ffffffffff600000 si:7fe274f27e08 di:ffffffffff600000 [436414.128409] exe[68433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558dec846378 cs:33 sp:7ea7073f5f90 ax:7ea7073f6020 si:ffffffffff600000 di:558dec910263 [436478.732520] exe[993480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436479.009704] exe[866559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436479.461267] exe[866559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436493.256041] exe[77155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596749b9378 cs:33 sp:7f4e68f21f90 ax:7f4e68f22020 si:ffffffffff600000 di:559674a83263 [436561.880520] exe[876351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8f1ce1378 cs:33 sp:7f8bb13fef90 ax:7f8bb13ff020 si:ffffffffff600000 di:55a8f1dab263 [436567.470019] exe[974437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac156cf378 cs:33 sp:7f6aff8faf90 ax:7f6aff8fb020 si:ffffffffff600000 di:55ac15799263 [436599.819558] exe[866059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054d9e378 cs:33 sp:7f0f4cbf2f90 ax:7f0f4cbf3020 si:ffffffffff600000 di:559054e68263 [436635.476020] exe[97663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef2173378 cs:33 sp:7ef592333f90 ax:7ef592334020 si:ffffffffff600000 di:561ef223d263 [436799.113308] exe[105013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436799.517247] exe[874550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436799.965569] exe[941373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436892.125353] exe[131143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f1fecc378 cs:33 sp:7ebd1ab8df90 ax:7ebd1ab8e020 si:ffffffffff600000 di:558f1ff96263 [437086.663234] exe[83158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [437466.788597] exe[894928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892c38e8 ax:ffffffffff600000 si:7f07892c3e08 di:ffffffffff600000 [437466.932550] exe[955953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892c38e8 ax:ffffffffff600000 si:7f07892c3e08 di:ffffffffff600000 [437466.932670] exe[184596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892a28e8 ax:ffffffffff600000 si:7f07892a2e08 di:ffffffffff600000 [437467.224997] exe[853471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892818e8 ax:ffffffffff600000 si:7f0789281e08 di:ffffffffff600000 [438055.978112] exe[310404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eed68e8 ax:ffffffffff600000 si:7efb2eed6e08 di:ffffffffff600000 [438056.180687] exe[310440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eed68e8 ax:ffffffffff600000 si:7efb2eed6e08 di:ffffffffff600000 [438056.433217] exe[310496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eeb58e8 ax:ffffffffff600000 si:7efb2eeb5e08 di:ffffffffff600000 [438550.272474] exe[83404] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438550.629007] exe[999564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438550.724359] exe[976519] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438570.052377] exe[312428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557e3197378 cs:33 sp:7f6c30762f90 ax:7f6c30763020 si:ffffffffff600000 di:5557e3261263 [438971.456264] exe[394752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a5dee378 cs:33 sp:7f05440dbf90 ax:7f05440dc020 si:ffffffffff600000 di:5608a5eb8263 [439825.721926] exe[542324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439825.804878] exe[604297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439825.967207] exe[495951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439826.004132] exe[542324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [440054.823048] exe[518705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440055.038034] exe[621715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440055.255915] exe[644180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440228.665030] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c19ef90 ax:7f7d1c19f020 si:ffffffffff600000 di:561bb5529263 [440228.867753] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c15cf90 ax:7f7d1c15d020 si:ffffffffff600000 di:561bb5529263 [440229.172551] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c15cf90 ax:7f7d1c15d020 si:ffffffffff600000 di:561bb5529263 [441238.970327] exe[768778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da848e8 ax:ffffffffff600000 si:7f741da84e08 di:ffffffffff600000 [441239.819142] exe[584875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da218e8 ax:ffffffffff600000 si:7f741da21e08 di:ffffffffff600000 [441240.481316] exe[820501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da638e8 ax:ffffffffff600000 si:7f741da63e08 di:ffffffffff600000 [441240.481616] exe[571737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da848e8 ax:ffffffffff600000 si:7f741da84e08 di:ffffffffff600000 [441248.663550] exe[784547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441248.821069] exe[770417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441248.951087] exe[827735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441249.009520] exe[765438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441889.918703] exe[849331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [441890.957892] exe[719393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [441891.252618] exe[661904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [444034.025546] exe[950682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444034.291982] exe[224578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444034.292411] exe[224079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b2e9f90 ax:7f906b2ea020 si:ffffffffff600000 di:559a40246263 [444034.574824] exe[224087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444377.084968] exe[235076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d7e478e8 ax:ffffffffff600000 si:7fd8d7e47e08 di:ffffffffff600000 [444378.122989] exe[231037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d7e478e8 ax:ffffffffff600000 si:7fd8d7e47e08 di:ffffffffff600000 [444378.891223] exe[222392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d79fe8e8 ax:ffffffffff600000 si:7fd8d79fee08 di:ffffffffff600000 [444450.301356] exe[236575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4bae8e8 ax:ffffffffff600000 si:7f32a4baee08 di:ffffffffff600000 [444450.841718] exe[224261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4bae8e8 ax:ffffffffff600000 si:7f32a4baee08 di:ffffffffff600000 [444451.444213] exe[241086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4b8d8e8 ax:ffffffffff600000 si:7f32a4b8de08 di:ffffffffff600000 [444484.306928] exe[279159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [444484.904850] exe[985478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [444485.351559] exe[979131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [445292.090973] exe[396012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.315313] exe[396065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.549323] exe[396103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.574893] exe[396105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5adcf48e8 ax:ffffffffff600000 si:7ee5adcf4e08 di:ffffffffff600000 [447997.574021] exe[765367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447997.950554] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447997.979711] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.007729] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.042742] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.076642] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.110930] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.146734] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.180450] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.214866] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [451968.259481] warn_bad_vsyscall: 25 callbacks suppressed [451968.259485] exe[468193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [451968.425952] exe[468218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [451969.126662] exe[468285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [452295.347575] exe[20405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452296.112938] exe[42124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452296.259276] exe[76592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452319.171150] exe[20530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.276113] exe[21484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.390853] exe[20403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.525404] exe[21478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.652276] exe[64119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.743475] exe[20487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.833096] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.945010] exe[50875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452320.006835] exe[21478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452320.164099] exe[435045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.436756] warn_bad_vsyscall: 83 callbacks suppressed [452324.436760] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.729345] exe[64119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.944993] exe[50858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.120093] exe[20378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452325.286261] exe[20147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.442899] exe[64074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.450554] exe[20501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452325.607647] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.737695] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.890561] exe[21287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.446174] warn_bad_vsyscall: 120 callbacks suppressed [452329.446177] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.480077] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.510413] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.549968] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.578785] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.606895] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.639888] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.672917] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.851231] exe[20460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452330.128883] exe[76592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452334.549640] warn_bad_vsyscall: 65 callbacks suppressed [452334.549645] exe[20403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452334.718010] exe[20119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.751443] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.780948] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.812581] exe[20148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.840892] exe[20041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.867634] exe[20041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.895646] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.925044] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.955585] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452339.589963] warn_bad_vsyscall: 139 callbacks suppressed [452339.589966] exe[20134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452339.640564] exe[20251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452339.775276] exe[20185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.059991] exe[42080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.290830] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452340.486345] exe[20193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.643427] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.680251] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.978400] exe[20147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452341.444372] exe[20267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452344.660232] warn_bad_vsyscall: 10 callbacks suppressed [452344.660235] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452344.903705] exe[20386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.693056] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.724799] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.764463] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.794541] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.824795] exe[20157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.855818] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.889579] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.924579] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452349.746468] warn_bad_vsyscall: 43 callbacks suppressed [452349.746471] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.113817] exe[69794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.363064] exe[76542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.536165] exe[54267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.671631] exe[51059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.812918] exe[22427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.832387] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452350.952814] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452351.072785] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452351.209398] exe[51043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.250504] warn_bad_vsyscall: 119 callbacks suppressed [452355.250507] exe[20151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.423492] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.515766] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.657921] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.755664] exe[20573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.870486] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.962609] exe[20592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.159715] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.212450] exe[22422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.355659] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.376744] warn_bad_vsyscall: 116 callbacks suppressed [452360.376747] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.709828] exe[20302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.071503] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.547987] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.726910] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.771671] exe[20361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.918275] exe[20224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.148831] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.337844] exe[20134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.530033] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.512425] warn_bad_vsyscall: 16 callbacks suppressed [452365.512428] exe[434993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.720991] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.882172] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.024659] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.057332] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.090324] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.127998] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.161781] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.191615] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.224902] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.526773] warn_bad_vsyscall: 112 callbacks suppressed [452370.526777] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.562416] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.591092] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.620943] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.653877] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.686990] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.718028] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.749500] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.780430] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.810140] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.643596] warn_bad_vsyscall: 104 callbacks suppressed [452375.643601] exe[20426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.968939] exe[20368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.163289] exe[20272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.299944] exe[20571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.390126] exe[20384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.488374] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.569364] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.685764] exe[20354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.791650] exe[20251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.876874] exe[20185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452380.776618] warn_bad_vsyscall: 81 callbacks suppressed [452380.776622] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.053582] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.285245] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.344369] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.603612] exe[434944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.899289] exe[20487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.136420] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.427228] exe[20609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.100617] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.231624] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452387.563018] warn_bad_vsyscall: 6 callbacks suppressed [452387.563021] exe[20676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.388727] exe[434968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.748784] exe[434984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.391785] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.694170] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.852582] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452395.075739] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [453839.883317] exe[631930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.323036] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.350283] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.384432] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.416687] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.455576] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.488414] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.519004] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.554215] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.584418] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453926.991119] warn_bad_vsyscall: 89 callbacks suppressed [453926.991123] exe[603201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453927.250974] exe[603330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453928.195296] exe[703378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c44f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [454782.238075] exe[396221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.124977] exe[459049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.183247] exe[445693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db8fdd8e8 ax:ffffffffff600000 si:7f4db8fdde08 di:ffffffffff600000 [454783.450566] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.503948] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94338e8 ax:ffffffffff600000 si:7f4db9433e08 di:ffffffffff600000 [458511.597367] exe[507232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.806667] exe[521019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.991710] exe[501394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [459012.705765] exe[563613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.872407] exe[594293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.986079] exe[593070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459068.840155] exe[565482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.513267] exe[582378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.652731] exe[549515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [460974.883142] exe[869775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.093493] exe[497807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.226389] exe[846635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [461621.505252] exe[911237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461621.622374] exe[912332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846258e8 ax:ffffffffff600000 si:7fc384625e08 di:ffffffffff600000 [461621.768807] exe[960374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461801.274870] exe[17419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461801.513112] exe[2380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.102011] exe[527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.104043] exe[17522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc566f90 ax:7f4efc567020 si:ffffffffff600000 di:5631f5faa263 [461910.586774] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.699507] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.762959] exe[38204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.494148] exe[36375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.594008] exe[54110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.624504] exe[999751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.754307] exe[331082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464426.407828] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.661275] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.713248] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.910976] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464778.939051] exe[440307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.412182] exe[432089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.648195] exe[434189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebb7f90 ax:7fe36ebb8020 si:ffffffffff600000 di:55a65d02f263 [465117.767639] exe[396252] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465119.063660] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.142447] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.307108] exe[125097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.443573] exe[172292] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.539664] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.620290] exe[401105] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.845479] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.938287] exe[74895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465121.014719] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.820298] warn_bad_vsyscall: 22 callbacks suppressed [465122.820300] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.867136] exe[76377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.950259] exe[78164] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.992513] exe[181488] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.083877] exe[399798] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.102595] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.176201] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.249117] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.349779] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.398268] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465178.032934] warn_bad_vsyscall: 5 callbacks suppressed [465178.032937] exe[412069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.454081] exe[407255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.857302] exe[389487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790e8cf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465303.071148] exe[437548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.262589] exe[450736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.474127] exe[523237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465419.445545] exe[482493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.803707] exe[425776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.857203] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.080303] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.110220] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.147047] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.173532] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.214517] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.243743] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.271390] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [468653.293283] warn_bad_vsyscall: 58 callbacks suppressed [468653.293286] exe[834229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [468653.662372] exe[943734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f443ddf90 ax:7f8f443de020 si:ffffffffff600000 di:55ff4cb2e263 [468654.169956] exe[807744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [469521.763903] exe[187406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.865137] exe[188177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.948983] exe[188197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469795.157580] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.083194] exe[203667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.194673] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469897.990110] exe[96084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584809da378 cs:33 sp:7fcac8b08f90 ax:7fcac8b09020 si:ffffffffff600000 di:558480aa4263 [469934.689791] exe[103783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e4b6d378 cs:33 sp:7f6df914ef90 ax:7f6df914f020 si:ffffffffff600000 di:5616e4c37263 [469959.251151] exe[123458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c6c56c378 cs:33 sp:7fa214269f90 ax:7fa21426a020 si:ffffffffff600000 di:556c6c636263 [469964.324146] exe[766830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d84aca5378 cs:33 sp:7fdce428af90 ax:7fdce428b020 si:ffffffffff600000 di:55d84ad6f263 [469964.498312] exe[159485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643e0c63378 cs:33 sp:7fc80c55bf90 ax:7fc80c55c020 si:ffffffffff600000 di:5643e0d2d263 [470005.029795] exe[261324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8ce652378 cs:33 sp:7ee12c0c7f90 ax:7ee12c0c8020 si:ffffffffff600000 di:55a8ce71c263 [470063.582095] exe[223157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [470156.097825] exe[230225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5bf458378 cs:33 sp:7f7678cd8f90 ax:7f7678cd9020 si:ffffffffff600000 di:55e5bf522263 [470232.273906] exe[295772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e510ea378 cs:33 sp:7ef86efd5f90 ax:7ef86efd6020 si:ffffffffff600000 di:558e511b4263 [470274.610481] exe[149329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b59b89f378 cs:33 sp:7f98f2ca9f90 ax:7f98f2caa020 si:ffffffffff600000 di:55b59b969263 [470291.063893] exe[304135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.259202] exe[304157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.429296] exe[304186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7933dd8e8 ax:ffffffffff600000 si:7ea7933dde08 di:ffffffffff600000 [470342.657336] exe[187967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52a305378 cs:33 sp:7f821fffef90 ax:7f821ffff020 si:ffffffffff600000 di:55e52a3cf263 [470650.325703] exe[362231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d4aad378 cs:33 sp:7ea12a708f90 ax:7ea12a709020 si:ffffffffff600000 di:5575d4b77263 [470750.386241] exe[199507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56297e927378 cs:33 sp:7f736d7fcf90 ax:7f736d7fd020 si:ffffffffff600000 di:56297e9f1263 [470929.605855] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.864255] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.867536] exe[212707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b71f90 ax:7f1b01b72020 si:ffffffffff600000 di:5570f4e5a263 [470930.200697] exe[223353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [471390.014371] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.140633] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.304896] exe[224047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471643.332270] exe[312935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471643.806506] exe[313686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471644.042859] exe[311449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [473434.171293] exe[556303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.462856] exe[556897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.590169] exe[584003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c17a328506 cs:33 sp:7fac627fe8e8 ax:ffffffffff600000 si:7fac627fee08 di:ffffffffff600000 [473434.742395] exe[378120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788cf8e8 ax:ffffffffff600000 si:7f67788cfe08 di:ffffffffff600000 [475531.985713] exe[955127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475534.647773] exe[955520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e4cf88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475535.014743] exe[842220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [476428.183885] exe[254431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476428.429002] exe[266248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee88af90 ax:7fe8ee88b020 si:ffffffffff600000 di:561d26249263 [476428.674038] exe[254526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476836.073376] exe[967895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476836.725506] exe[230071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.234892] exe[327470] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.379177] exe[237748] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [477324.454399] exe[862632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.608197] exe[862872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.645374] exe[862862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455bcf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.826559] exe[181805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477552.522007] exe[443515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.700306] exe[443336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071370bf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.809114] exe[443232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [478002.753162] exe[423620] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.202873] exe[225170] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.679956] exe[324851] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [481141.030672] exe[911967] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.245128] exe[998512] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.914132] exe[998499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [482453.684749] exe[82438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482453.852372] exe[228268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482454.381147] exe[80367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482579.862151] exe[210610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.195219] exe[968597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.298293] exe[957948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.509187] exe[787994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482994.972200] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.185185] exe[343640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.334686] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.335306] exe[9408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d13f90 ax:7ff653d14020 si:ffffffffff600000 di:56470fcd2263 [483562.880290] exe[464727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483563.788436] exe[464848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40ca8e8 ax:ffffffffff600000 si:7ed0e40cae08 di:ffffffffff600000 [483563.790083] exe[464847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483564.662126] exe[464983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483607.993920] exe[373867] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.537312] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.960255] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483997.435548] exe[518836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.529943] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.718422] exe[531932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.788834] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [484247.493583] exe[416475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.701073] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.818993] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484624.077077] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.185140] exe[599425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.233037] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.464316] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484843.969145] exe[664838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.677141] exe[664666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.724668] exe[664655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.842072] exe[664814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.875441] exe[664882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.903394] exe[664876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.933390] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.963966] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.992510] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484845.021333] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [485357.629810] warn_bad_vsyscall: 26 callbacks suppressed [485357.629813] exe[752771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.762180] exe[752804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.828618] exe[752813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfd7e8e8 ax:ffffffffff600000 si:7edbdfd7ee08 di:ffffffffff600000 [485358.264730] exe[752858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [486138.984904] exe[909799] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486139.718931] exe[553769] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.260970] exe[120731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.486949] exe[911905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486385.904716] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.280569] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.607482] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.629603] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.653764] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.677480] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.708537] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.732590] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.785549] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.826387] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.653818] warn_bad_vsyscall: 57 callbacks suppressed [486561.653821] exe[796855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.836794] exe[951632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.867103] exe[951621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.208045] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.236295] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486672.542707] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486673.497112] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486674.626614] exe[530007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8c68e8 ax:ffffffffff600000 si:7f858d8c6e08 di:ffffffffff600000 [486874.081545] exe[560872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f391ff90 ax:7fd2f3920020 si:ffffffffff600000 di:560e13c20263 [486874.510186] exe[596877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f389bf90 ax:7fd2f389c020 si:ffffffffff600000 di:560e13c20263 [486875.104166] exe[613238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38bcf90 ax:7fd2f38bd020 si:ffffffffff600000 di:560e13c20263 [486875.113300] exe[627247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38fef90 ax:7fd2f38ff020 si:ffffffffff600000 di:560e13c20263 [487047.654469] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.773269] exe[22432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.798937] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [487047.885522] exe[960732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [489064.946551] exe[794530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.240439] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [489065.594933] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.652354] exe[327189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [492227.876759] exe[810857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.095459] exe[809201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.282632] exe[820192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492236.097033] exe[818993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.950535] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.979619] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.010014] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.039759] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.068208] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.100012] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.131041] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.162624] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.192724] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [493355.860552] warn_bad_vsyscall: 25 callbacks suppressed [493355.860555] exe[16428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556418eb2506 cs:33 sp:7eaf25e2a8e8 ax:ffffffffff600000 si:7eaf25e2ae08 di:ffffffffff600000 [493385.866795] exe[13602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.099883] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.145033] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2c2f90 ax:7fde5a2c3020 si:ffffffffff600000 di:5607d0805263 [493386.531715] exe[958211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [499403.618694] exe[577154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.213309] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.598524] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.642197] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.676405] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.711719] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.755062] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.794288] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.829192] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.859253] exe[577068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499574.807222] warn_bad_vsyscall: 25 callbacks suppressed [499574.807225] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.542140] exe[81138] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.695813] exe[931612] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499576.241749] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499682.792330] exe[885453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499683.358090] exe[885346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499684.030110] exe[891018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [502018.711967] exe[251699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502018.944862] exe[248613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502019.210854] exe[239250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502857.890467] exe[380446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [502858.937796] exe[380602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a218e8 ax:ffffffffff600000 si:7ea240a21e08 di:ffffffffff600000 [502859.765766] exe[380699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [503806.324621] exe[511481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503806.627890] exe[511145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503807.050146] exe[391986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [507676.373579] exe[690142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.548866] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.730773] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507763.555050] exe[107808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.242476] exe[157535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594719] exe[116576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594763] exe[68833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7ee5f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507834.294723] exe[113402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.591252] exe[70450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.786964] exe[113372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [508002.202321] exe[111898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508002.639586] exe[14547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508003.200103] exe[71611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5ddf90 ax:7fce6c5de020 si:ffffffffff600000 di:556caa0e6263 [508229.235140] exe[181353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.521159] exe[234914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.561667] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.570204] exe[239233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.610169] exe[157326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.624384] exe[239234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.638426] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.653657] exe[145835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.660643] exe[89644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.667222] exe[86216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [509817.688040] warn_bad_vsyscall: 25 callbacks suppressed [509817.688044] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.028139] exe[473790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.408974] exe[477601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.520065] exe[477712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5bcf90 ax:7fce6c5bd020 si:ffffffffff600000 di:556caa0e6263 [509929.138239] exe[247549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509929.820995] exe[306749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509930.508972] exe[78331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [510227.095681] exe[520551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510227.555215] exe[112835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510228.013949] exe[112909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.150431] exe[64604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.481296] exe[519181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.819665] exe[12094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510890.003890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [510890.290614] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.320039] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.344966] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.378890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.408705] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.434485] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.456131] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.497522] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.527738] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511128.415067] warn_bad_vsyscall: 26 callbacks suppressed [511128.415071] exe[431091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511128.619822] exe[557068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511129.014515] exe[546219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511130.514600] exe[384929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511130.785346] exe[408329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.153389] exe[545786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.325754] exe[477249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511815.561794] exe[716451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511815.816348] exe[727406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511815.818156] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511816.284611] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511817.183958] exe[365286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.344225] exe[365154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.658146] exe[365183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511896.404978] exe[780755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.469127] exe[759203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.628082] exe[758251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5bc8e8 ax:ffffffffff600000 si:7f7b8e5bce08 di:ffffffffff600000 [511898.485985] exe[754156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511898.487710] exe[761872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5dd8e8 ax:ffffffffff600000 si:7f7b8e5dde08 di:ffffffffff600000 [513091.472849] exe[954885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.621861] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.800603] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.830744] exe[999670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513118.279835] exe[739299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513121.253454] exe[824157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513124.363273] exe[792443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513130.358952] exe[8820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513130.924248] exe[8926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513131.311077] exe[8989] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513347.499721] exe[844338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513347.745548] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513348.026638] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [514382.611721] exe[160258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514382.956334] exe[159801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514383.250979] exe[155805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [516619.624744] exe[600647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.810220] exe[600678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.997097] exe[600706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [518635.151335] exe[785129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831ee8e8 ax:ffffffffff600000 si:7efd831eee08 di:ffffffffff600000 [518635.398875] exe[881597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [518635.762522] exe[686801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [519061.609108] exe[993392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549e68e8 ax:ffffffffff600000 si:7fb4549e6e08 di:ffffffffff600000 [519062.146104] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.176245] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.204643] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.237218] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.278344] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.326524] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.362003] exe[993488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.398938] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.434310] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519321.224856] warn_bad_vsyscall: 35 callbacks suppressed [519321.224859] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.071890] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.349270] exe[831034] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519323.101910] exe[828564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519418.938113] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.124785] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.422323] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb713fe8e8 ax:ffffffffff600000 si:7fbb713fee08 di:ffffffffff600000 [519423.313138] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519423.759529] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.048624] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.169793] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.460945] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.621292] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.728570] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.918809] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.249385] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.475756] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.658520] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.782660] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519554.112540] warn_bad_vsyscall: 2 callbacks suppressed [519554.112543] exe[874461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdd792a506 cs:33 sp:7fa6b13878e8 ax:ffffffffff600000 si:7fa6b1387e08 di:ffffffffff600000 [519557.501878] exe[873844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8089b6506 cs:33 sp:7fc10e5da8e8 ax:ffffffffff600000 si:7fc10e5dae08 di:ffffffffff600000 [519577.659059] exe[82765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562820fde506 cs:33 sp:7eedab7498e8 ax:ffffffffff600000 si:7eedab749e08 di:ffffffffff600000 [519584.738552] exe[58078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ec998506 cs:33 sp:7f7efb3758e8 ax:ffffffffff600000 si:7f7efb375e08 di:ffffffffff600000 [519609.379371] exe[87803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e22475506 cs:33 sp:7ecf647c48e8 ax:ffffffffff600000 si:7ecf647c4e08 di:ffffffffff600000 [519628.989576] exe[48441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564466748506 cs:33 sp:7f97b97ab8e8 ax:ffffffffff600000 si:7f97b97abe08 di:ffffffffff600000 [519697.399147] exe[895286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603c8fa3506 cs:33 sp:7f4b665dd8e8 ax:ffffffffff600000 si:7f4b665dde08 di:ffffffffff600000 [519707.756372] exe[104920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c88c8b506 cs:33 sp:7ed8729d38e8 ax:ffffffffff600000 si:7ed8729d3e08 di:ffffffffff600000 [519736.385951] exe[860627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb11993506 cs:33 sp:7fddf2dfe8e8 ax:ffffffffff600000 si:7fddf2dfee08 di:ffffffffff600000 [519753.822489] exe[767301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d23e394506 cs:33 sp:7f9173acb8e8 ax:ffffffffff600000 si:7f9173acbe08 di:ffffffffff600000 [519757.057066] exe[845317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4ddde1506 cs:33 sp:7fd109fa48e8 ax:ffffffffff600000 si:7fd109fa4e08 di:ffffffffff600000 [519876.439182] exe[897410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831b9be506 cs:33 sp:7fbda526b8e8 ax:ffffffffff600000 si:7fbda526be08 di:ffffffffff600000 [520444.488006] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.299834] exe[761888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.385694] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720238e8 ax:ffffffffff600000 si:7fbb72023e08 di:ffffffffff600000 [520445.886983] exe[761828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520523.027897] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520931.370358] exe[870454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.923159] exe[174239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.971734] exe[25569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520932.363924] exe[165825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [521530.430303] exe[914217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521530.809464] exe[79751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.087883] exe[914209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.090430] exe[941552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1a18e8 ax:ffffffffff600000 si:7f6c6b1a1e08 di:ffffffffff600000 [521621.624046] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521621.887665] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.143566] exe[971836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.601686] exe[914183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [522165.620567] exe[375382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522166.674687] exe[755888] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522167.315216] exe[665740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [523335.356992] exe[851722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8da4e2378 cs:33 sp:7f19bb7b1f90 ax:7f19bb7b2020 si:ffffffffff600000 di:55d8da5ac263 [523696.719807] exe[790620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.141183] exe[864062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.288853] exe[867590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.294448] exe[760978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.493039] exe[949043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.683429] exe[757522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.858882] exe[866385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.980507] exe[762875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523698.082404] exe[757793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523698.157597] exe[866398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523813.200318] warn_bad_vsyscall: 3 callbacks suppressed [523813.200322] exe[4485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.402664] exe[4544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.562744] exe[4588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.794163] exe[4651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [524483.221410] exe[974370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524483.986373] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524484.576826] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524485.259417] exe[664199] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.000132] exe[655157] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.694731] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524487.323887] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524521.795839] exe[32549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524521.937888] exe[32485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.111490] exe[901157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.967578] exe[887460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [525522.940667] exe[416708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55857eee5378 cs:33 sp:7f8a4335cf90 ax:7f8a4335d020 si:ffffffffff600000 di:55857efaf263 [525651.344079] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525651.878001] exe[408128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.407038] exe[256257] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.906015] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525653.457756] exe[353684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.025172] exe[331213] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.424978] exe[330764] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525868.775236] exe[487327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.002201] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.160146] exe[516330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.264758] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [526229.543336] exe[615841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ba44e1506 cs:33 sp:7ee56b3998e8 ax:ffffffffff600000 si:7ee56b399e08 di:ffffffffff600000 [526560.550369] exe[580360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526560.858054] exe[564651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.074815] exe[632591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.569258] exe[603555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [527280.050423] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527280.903115] exe[626020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527281.858410] exe[677920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527282.403610] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.018577] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.729696] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527498.347855] exe[852623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527499.201975] exe[856729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527811.303068] exe[918035] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527811.886300] exe[908844] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.297325] exe[909223] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.974063] exe[923647] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [528496.349157] exe[499553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.541715] exe[487183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.932757] exe[921708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528497.209485] exe[487338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528723.736962] exe[916903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b10db32378 cs:33 sp:7fbae4b7df90 ax:7fbae4b7e020 si:ffffffffff600000 di:55b10dbfc263 [528727.208941] exe[159029] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528727.820079] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528728.532737] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528729.016551] exe[118382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528847.976578] exe[79475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8dd94f378 cs:33 sp:7f732c6a1f90 ax:7f732c6a2020 si:ffffffffff600000 di:55f8dda19263 [528979.712673] exe[253031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c1c9f378 cs:33 sp:7ede2a591f90 ax:7ede2a592020 si:ffffffffff600000 di:55d9c1d69263 [528995.176615] exe[38160] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528999.994333] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bac2378 cs:33 sp:7f68819e9f90 ax:7f68819ea020 si:ffffffffff600000 di:55794bb8c263 [529018.426746] exe[776579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529022.319491] exe[261595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164526a378 cs:33 sp:7eb1d8a6cf90 ax:7eb1d8a6d020 si:ffffffffff600000 di:561645334263 [529166.570761] exe[118922] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529202.234713] exe[89793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [529238.278836] exe[491819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eee85dd378 cs:33 sp:7f81ae34ff90 ax:7f81ae350020 si:ffffffffff600000 di:55eee86a7263 [529265.608604] exe[307877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561860943378 cs:33 sp:7eb3377bff90 ax:7eb3377c0020 si:ffffffffff600000 di:561860a0d263 [529278.926814] exe[751165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529356.590619] exe[284045] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [529373.548289] exe[234183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.738418] exe[250555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.994514] exe[155598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529374.220402] exe[155464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529445.975759] exe[905639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e81837c506 cs:33 sp:7fc0e81728e8 ax:ffffffffff600000 si:7fc0e8172e08 di:ffffffffff600000 [529483.167680] exe[302150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cb9c26506 cs:33 sp:7fd09f9fe8e8 ax:ffffffffff600000 si:7fd09f9fee08 di:ffffffffff600000 [529537.770697] exe[158011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529563.427709] exe[201461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c94190378 cs:33 sp:7fa0b7a4ef90 ax:7fa0b7a4f020 si:ffffffffff600000 di:559c9425a263 [529616.622213] exe[377995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529618.355844] exe[378376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a5fdf506 cs:33 sp:7ec9ac0258e8 ax:ffffffffff600000 si:7ec9ac025e08 di:ffffffffff600000 [529702.778780] exe[247417] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [529702.901762] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bb11506 cs:33 sp:7f68819e98e8 ax:ffffffffff600000 si:7f68819e9e08 di:ffffffffff600000 [529776.598550] exe[406410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529776.811194] exe[406435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.092424] exe[406483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.296612] exe[406522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529777.504664] exe[406561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529792.584176] exe[409476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529792.809749] exe[409520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529843.923692] exe[977610] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [529967.575924] exe[439863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754c343506 cs:33 sp:7ec9cae4d8e8 ax:ffffffffff600000 si:7ec9cae4de08 di:ffffffffff600000 [530976.665860] exe[317657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.862405] exe[318139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.900219] exe[318033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a65dd8e8 ax:ffffffffff600000 si:7f42a65dde08 di:ffffffffff600000 [530977.163011] exe[317516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [531139.627279] exe[193418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613d41b5506 cs:33 sp:7f367482d8e8 ax:ffffffffff600000 si:7f367482de08 di:ffffffffff600000 [531183.971276] exe[611426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b4b2d1506 cs:33 sp:7f3dd54d58e8 ax:ffffffffff600000 si:7f3dd54d5e08 di:ffffffffff600000 [531788.700028] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c0c7c2506 cs:33 sp:7fb5ad28c8e8 ax:ffffffffff600000 si:7fb5ad28ce08 di:ffffffffff600000 [531916.930531] exe[832720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571c50a8378 cs:33 sp:7eb248902f90 ax:7eb248903020 si:ffffffffff600000 di:5571c5172263 [532080.424887] exe[868851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c67d66e506 cs:33 sp:7f53642478e8 ax:ffffffffff600000 si:7f5364247e08 di:ffffffffff600000 [532289.379359] exe[381920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560457a39506 cs:33 sp:7fdb4e12c8e8 ax:ffffffffff600000 si:7fdb4e12ce08 di:ffffffffff600000 [532560.574949] exe[656970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bca6b58506 cs:33 sp:7f265394e8e8 ax:ffffffffff600000 si:7f265394ee08 di:ffffffffff600000 [532769.375655] exe[812068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e6712c506 cs:33 sp:7f0a438af8e8 ax:ffffffffff600000 si:7f0a438afe08 di:ffffffffff600000 [533088.043283] exe[824650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e670dd378 cs:33 sp:7f0a438aff90 ax:7f0a438b0020 si:ffffffffff600000 di:558e671a7263 [533337.460065] exe[150292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558721cbd506 cs:33 sp:7fb56c8428e8 ax:ffffffffff600000 si:7fb56c842e08 di:ffffffffff600000 [534281.690946] exe[992018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4edd68506 cs:33 sp:7f108a9fe8e8 ax:ffffffffff600000 si:7f108a9fee08 di:ffffffffff600000 [534375.607574] exe[143055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3f3bfd506 cs:33 sp:7fc23d0d28e8 ax:ffffffffff600000 si:7fc23d0d2e08 di:ffffffffff600000 [535936.955346] exe[161642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535937.540263] exe[146021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535938.057834] exe[191075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [536640.044057] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536640.478184] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536641.102847] exe[169864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536760.233015] exe[798427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.494718] exe[777386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.619426] exe[777178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [538376.728414] exe[762704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538377.480726] exe[815485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538378.006487] exe[756985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [542619.586953] exe[289803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.036619] exe[515700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.149058] exe[245662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757858e8 ax:ffffffffff600000 si:7f1775785e08 di:ffffffffff600000 [542620.639115] exe[242836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.698491] exe[480473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [545014.389683] exe[231699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.613362] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.674664] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545015.075123] exe[231809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [547130.486912] exe[563254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [547131.110726] exe[563388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29661dd8e8 ax:ffffffffff600000 si:7f29661dde08 di:ffffffffff600000 [547131.511512] exe[571393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [549634.232954] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d549f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.487935] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.634501] exe[979228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549637.495512] exe[971873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.796926] exe[774750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.834134] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.868969] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.900776] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.933044] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.963012] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.239346] warn_bad_vsyscall: 110 callbacks suppressed [549639.239350] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.274044] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.302757] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.332294] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.361405] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.398767] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.429168] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.462120] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [553443.422081] exe[428712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebfe8e8 ax:ffffffffff600000 si:7f944ebfee08 di:ffffffffff600000 [553443.696890] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.725457] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.768620] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.801135] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.846453] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.875838] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.909234] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.937997] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.967254] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [554063.082514] warn_bad_vsyscall: 25 callbacks suppressed [554063.082518] exe[933259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [554063.832690] exe[934247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e915f90 ax:7f609e916020 si:ffffffffff600000 di:55fe1eba8263 [554064.792029] exe[953802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [555963.709679] exe[145884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555963.921954] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.211241] exe[124886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.240005] exe[124578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.272625] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.312913] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.346670] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.382518] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.420817] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.454434] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [556474.533301] warn_bad_vsyscall: 25 callbacks suppressed [556474.533304] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.111363] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.201462] exe[430822] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.234523] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.297770] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.300962] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.317176] exe[431225] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.382899] exe[432571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.403086] exe[408776] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.445979] exe[333239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556479.591895] warn_bad_vsyscall: 55 callbacks suppressed [556479.591898] exe[432784] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.700484] exe[432591] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.783839] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [560888.788106] exe[203416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560888.962471] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.089080] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8388e8 ax:ffffffffff600000 si:7fc8dc838e08 di:ffffffffff600000 [560889.195751] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.282307] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.399058] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.519987] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [561529.897718] exe[277782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.482132] exe[277761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.637683] exe[277834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34e23506 cs:33 sp:7f7c6bbbb8e8 ax:ffffffffff600000 si:7f7c6bbbbe08 di:ffffffffff600000 [561530.809671] exe[299983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.815400] exe[277788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f82989fe8e8 ax:ffffffffff600000 si:7f82989fee08 di:ffffffffff600000 [561796.091845] exe[419501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afbbaaf506 cs:33 sp:7fe86c4298e8 ax:ffffffffff600000 si:7fe86c429e08 di:ffffffffff600000 [561825.289170] exe[453764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b48e8 ax:ffffffffff600000 si:7ee4439b4e08 di:ffffffffff600000 [561848.913208] exe[456224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563722589506 cs:33 sp:7f84c0dfe8e8 ax:ffffffffff600000 si:7f84c0dfee08 di:ffffffffff600000 [561851.319932] exe[460050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2debf0506 cs:33 sp:7ecc3c4a28e8 ax:ffffffffff600000 si:7ecc3c4a2e08 di:ffffffffff600000 [561915.585583] exe[323976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed99aff506 cs:33 sp:7ff37c9128e8 ax:ffffffffff600000 si:7ff37c912e08 di:ffffffffff600000 [561934.020955] exe[998115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570c326c506 cs:33 sp:7f668577e8e8 ax:ffffffffff600000 si:7f668577ee08 di:ffffffffff600000 [561953.664675] exe[277469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d35272506 cs:33 sp:7fbd0361f8e8 ax:ffffffffff600000 si:7fbd0361fe08 di:ffffffffff600000 [561970.437671] exe[72377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609b785e506 cs:33 sp:7fd994ee68e8 ax:ffffffffff600000 si:7fd994ee6e08 di:ffffffffff600000 [561984.281690] exe[402761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92f8e8 ax:ffffffffff600000 si:7ff70f92fe08 di:ffffffffff600000 [562036.627996] exe[626449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adf06ee506 cs:33 sp:7ff46a6ec8e8 ax:ffffffffff600000 si:7ff46a6ece08 di:ffffffffff600000 [562074.540203] exe[502407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b65b5506 cs:33 sp:7ece633828e8 ax:ffffffffff600000 si:7ece63382e08 di:ffffffffff600000 [562142.632482] exe[721438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9f8e8 ax:ffffffffff600000 si:7f3dacf9fe08 di:ffffffffff600000 [562235.437493] exe[324682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566ed525506 cs:33 sp:7fbbb99638e8 ax:ffffffffff600000 si:7fbbb9963e08 di:ffffffffff600000 [562315.329177] exe[877481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562516a0d506 cs:33 sp:7ff5537fe8e8 ax:ffffffffff600000 si:7ff5537fee08 di:ffffffffff600000 [562462.006699] exe[581598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [563030.556735] exe[700063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f785927506 cs:33 sp:7ec178c4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563096.192370] exe[713476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563117.680312] exe[454920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f730238506 cs:33 sp:7f6337f2ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563122.022382] exe[253410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c02072506 cs:33 sp:7fcd721b0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563202.504539] exe[734200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d93cbdb506 cs:33 sp:7eab72264f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563204.463571] exe[487674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea2aeaa506 cs:33 sp:7fc8d638ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563239.456469] exe[492582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea24a80506 cs:33 sp:7f29a8d8df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563252.548611] exe[669399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4c9e23506 cs:33 sp:7f07002baf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563347.858065] exe[760979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.115273] exe[761015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.382821] exe[761092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad9a8e8 ax:ffffffffff600000 si:7eef6ad9ae08 di:ffffffffff600000 [563348.427443] exe[761096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad798e8 ax:ffffffffff600000 si:7eef6ad79e08 di:ffffffffff600000 [563493.763407] exe[766587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563548.086856] exe[175391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563651.327994] exe[717543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563692.245805] exe[827783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a5063f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563928.667976] exe[527702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564155.743607] exe[912188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559305ee3506 cs:33 sp:7fe0fbbd4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564277.399393] exe[587753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fc0f2f506 cs:33 sp:7fa7dd3e5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564955.931500] exe[74429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565179.552296] exe[965371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565179.949700] exe[965291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565180.006039] exe[965078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d264d8e8 ax:ffffffffff600000 si:7f88d264de08 di:ffffffffff600000 [565180.519879] exe[965387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565202.957241] exe[125909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.576486] exe[126012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.793934] exe[126057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565213.065073] exe[128012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.187748] exe[128043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.299416] exe[128071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.502333] exe[128110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.716211] exe[128157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.925402] exe[128200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.182363] exe[128260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.372446] exe[128303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.647764] exe[128351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.868536] exe[128409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565545.641659] warn_bad_vsyscall: 2 callbacks suppressed [565545.641663] exe[200543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565545.802115] exe[200578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6a28e8 ax:ffffffffff600000 si:7ebf7e6a2e08 di:ffffffffff600000 [565545.905153] exe[200600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565650.588834] exe[806087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e20113506 cs:33 sp:7fb1aa6338e8 ax:ffffffffff600000 si:7fb1aa633e08 di:ffffffffff600000 [565651.548056] exe[223937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9c85d506 cs:33 sp:7ec10f7168e8 ax:ffffffffff600000 si:7ec10f716e08 di:ffffffffff600000 [565656.275280] exe[995258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591200b2506 cs:33 sp:7f49e0a758e8 ax:ffffffffff600000 si:7f49e0a75e08 di:ffffffffff600000 [565670.641593] exe[533377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552a8e8 ax:ffffffffff600000 si:7f447552ae08 di:ffffffffff600000 [565680.670608] exe[942017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562591aa9506 cs:33 sp:7fa81c7ca8e8 ax:ffffffffff600000 si:7fa81c7cae08 di:ffffffffff600000 [565711.713982] exe[39450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563922df506 cs:33 sp:7fc2d96308e8 ax:ffffffffff600000 si:7fc2d9630e08 di:ffffffffff600000 [565723.393446] exe[240669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.597603] exe[240730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.776304] exe[240786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565745.549125] exe[60180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [565748.127760] exe[247187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565775.217923] exe[139169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4700d5506 cs:33 sp:7fd44aa6e8e8 ax:ffffffffff600000 si:7fd44aa6ee08 di:ffffffffff600000 [565803.983493] exe[994231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310ce8e8 ax:ffffffffff600000 si:7f17310cee08 di:ffffffffff600000 [566237.558606] exe[360450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566237.968366] exe[159828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566557.535450] exe[879305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2adf4c506 cs:33 sp:7faf92ffe8e8 ax:ffffffffff600000 si:7faf92ffee08 di:ffffffffff600000 [566769.910937] exe[478419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae429f2506 cs:33 sp:7f5f9663f8e8 ax:ffffffffff600000 si:7f5f9663fe08 di:ffffffffff600000 [566819.445334] exe[492130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.268664] exe[492322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.440519] exe[492362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566883.919166] exe[507389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.316650] exe[507479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.471352] exe[507514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.833022] exe[507580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.256115] exe[507673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.779782] exe[507790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.201802] exe[507872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.352208] exe[507905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.682504] exe[507972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.849451] exe[508013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566888.942392] warn_bad_vsyscall: 11 callbacks suppressed [566888.942396] exe[508464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.097463] exe[508496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.528937] exe[508593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [568363.529692] exe[477342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310cef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [568672.310952] exe[927969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74cced506 cs:33 sp:7eebde1008e8 ax:ffffffffff600000 si:7eebde100e08 di:ffffffffff600000 [569398.096274] exe[984635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.238796] exe[905386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.455647] exe[985520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.712720] exe[984806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569910.066428] exe[224762] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569910.632343] exe[201328] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.250800] exe[199792] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.813485] exe[203019] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [570047.752780] exe[271961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570047.901856] exe[271997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.416861] exe[272111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.579425] exe[272145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [571783.707896] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.194869] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.641959] exe[278135] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571785.127448] exe[291277] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571905.665462] exe[477150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571905.949738] exe[469117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.290789] exe[700975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.593518] exe[711712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [573249.078735] exe[41126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dde6d4b506 cs:33 sp:7eb16a15d8e8 ax:ffffffffff600000 si:7eb16a15de08 di:ffffffffff600000 [573584.788940] exe[86626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.067935] exe[35877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.275066] exe[87760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.517506] exe[34805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [574483.489974] exe[310091] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.192395] exe[309168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.969613] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574485.635417] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574486.534118] exe[308408] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574487.260864] exe[311273] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574488.003113] exe[311465] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574663.849412] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.302394] exe[308000] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.711948] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574665.348510] exe[308600] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [575187.899280] exe[224246] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [575247.024855] exe[277414] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575553.467527] exe[197272] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575591.877045] exe[569013] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.457247] exe[803275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.968759] exe[801325] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575593.529917] exe[801474] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575675.154505] exe[361785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ada37ce506 cs:33 sp:7f7d8d8cf8e8 ax:ffffffffff600000 si:7f7d8d8cfe08 di:ffffffffff600000 [575736.449633] exe[551110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575736.884421] exe[550372] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575737.480809] exe[550716] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575738.124617] exe[598048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575989.495086] exe[216100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8d8752506 cs:33 sp:7f5b7f7568e8 ax:ffffffffff600000 si:7f5b7f756e08 di:ffffffffff600000 [576914.270717] exe[826145] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [576948.990859] exe[768466] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [576995.198628] exe[883126] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [577128.537897] exe[727305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e0ca7506 cs:33 sp:7f6d414e08e8 ax:ffffffffff600000 si:7f6d414e0e08 di:ffffffffff600000 [577561.479383] host.test[23526] bad frame in rt_sigreturn frame:00000000fcda1e47 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [577626.084294] exe[10945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.259175] exe[10910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.420687] exe[920683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.582843] exe[920600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [578199.863372] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.033994] exe[182981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.212239] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.346583] exe[95879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578487.159477] exe[262460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.312160] exe[262504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.487644] exe[262547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.638700] exe[262585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578951.720832] exe[98210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578951.956263] exe[193426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.347284] exe[194912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.608336] exe[98338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [579002.461601] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.052898] exe[379369] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.562211] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.068875] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.531662] exe[379608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.024654] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.507296] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579229.309326] exe[408109] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579229.831515] exe[109736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.323074] exe[111129] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.954406] exe[110567] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579510.928986] exe[345960] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579511.512040] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.083522] exe[498579] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.722480] exe[402636] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [580028.459609] exe[478967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580028.816291] exe[98709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.209866] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.380000] exe[100662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.685339] exe[479436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.767071] exe[291282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.794074] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [580029.813783] exe[291299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ed4554506 cs:33 sp:7fc6e68408e8 ax:ffffffffff600000 si:7fc6e6840e08 di:ffffffffff600000 [580030.084346] exe[98586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580030.185927] exe[249969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [581295.046970] warn_bad_vsyscall: 3 callbacks suppressed [581295.046973] exe[888832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635b1ae3506 cs:33 sp:7edc9bb648e8 ax:ffffffffff600000 si:7edc9bb64e08 di:ffffffffff600000 [581328.251546] exe[886592] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581328.858427] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581329.433744] exe[887148] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581330.199701] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581857.779362] exe[863870] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.246016] exe[858353] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.759851] exe[835298] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581859.186794] exe[859828] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [582230.216780] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.089910] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.714519] exe[17787] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582232.248110] exe[49529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582898.138584] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.635783] exe[228931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.919425] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582899.276316] exe[224387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [583078.653375] exe[11366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583078.827101] exe[254379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.016815] exe[254089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.687464] exe[946356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583227.716314] exe[936152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b95c4506 cs:33 sp:7f55b73118e8 ax:ffffffffff600000 si:7f55b7311e08 di:ffffffffff600000 [583426.305485] exe[67248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a68979b506 cs:33 sp:7f5072ffe8e8 ax:ffffffffff600000 si:7f5072ffee08 di:ffffffffff600000 [583454.290849] exe[255687] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [583480.181023] exe[336017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fecf90 ax:7ee428fed020 si:ffffffffff600000 di:562d9c4e7263 [583480.371169] exe[336055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fcbf90 ax:7ee428fcc020 si:ffffffffff600000 di:562d9c4e7263 [583483.043351] exe[336522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3ee64c378 cs:33 sp:7ea63ebfef90 ax:7ea63ebff020 si:ffffffffff600000 di:55c3ee716263 [583495.372738] exe[128161] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [583846.554415] exe[269507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [584222.358320] exe[397232] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [584456.247788] exe[396406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.449545] exe[984697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.623509] exe[305262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584466.027704] exe[136724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.150193] exe[982596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.299049] exe[56597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584775.716537] exe[481827] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [584808.112724] exe[458048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [585222.860500] exe[530169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb55b98506 cs:33 sp:7f21b07fd8e8 ax:ffffffffff600000 si:7f21b07fde08 di:ffffffffff600000 [585315.054088] exe[581751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e16a6c506 cs:33 sp:7ff99f62c8e8 ax:ffffffffff600000 si:7ff99f62ce08 di:ffffffffff600000 [585435.397665] exe[536719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1ca895506 cs:33 sp:7fee055e28e8 ax:ffffffffff600000 si:7fee055e2e08 di:ffffffffff600000 [585901.839725] exe[638902] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.237435] exe[635935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.491774] exe[588918] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000